From: Lew on
Peter Duniho wrote:
>>> Here's an article that suggests that, at the current rate of computer
>>> power advancement, in a couple hundred years, someone will be able to
>>> easily get through 256-bit AES

Thomas Pornin wrote:
>> It can also easily be shown that even in the ultimately optimistic

The assumption is that this is "ultimately optimistic". There may well be
much more efficient mechanisms and/or algorithms that either don't need to
test all keys, or somehow test multiple keys simultaneously with less energy
than required to "bump a single electron".

>> scenario of being able to test a key with as little energy as needed
>> to bump a single electron between two successive energy levels, and
>> assuming that you are able to channel the whole energy produced by
>> the Sun for the rest of its life (that's about 5 billion years), then
>> exploring a 256-bit key space will still require a few billion stars
>> -- i.e. an entire galaxy. Seems expensive.
>>
>> This basically shows that the current rate of computer advancement
>> cannot plausibly be maintained for the next two hundred years. [...]

Peter Duniho wrote:
> I admit to not being fully versed in the theory involved. But the
> Wikipedia article points out that the analysis to which you refer makes
> an assumption about the computations that turns out to not be true.
> Specifically, there are more efficient ways to do the computation,
> obviating the theoretical energy requirements according to analysis
> you're talking about.

Lasers passed through holograms are able to elicit correlations in a massively
parallel fashion. I'm sure they currently use far more energy than Thomas's
"ultimately optimistic" projection, but one can imagine ways in which the
massively parallel action surpasses the ratio of one key per electron "bump".
One can also envision the use of currently impractical physics, such as
string theory or tachyon transitions, to augment quantum effects in such a way
as to exceed Thomas's "optimism".

History shows us that it's dangerous to predict the impossibility of future
advances. That by itself doesn't mean Thomas is wrong, only that it's
dangerous to predict ultimate impossibility.

--
Lew
From: Tom Anderson on
On Sat, 27 Feb 2010, Lew wrote:

> Peter Duniho wrote:
>>>> Here's an article that suggests that, at the current rate of computer
>>>> power advancement, in a couple hundred years, someone will be able to
>>>> easily get through 256-bit AES
>
> Thomas Pornin wrote:
>>> It can also easily be shown that even in the ultimately optimistic
>
> The assumption is that this is "ultimately optimistic". There may well be
> much more efficient mechanisms and/or algorithms that either don't need to
> test all keys, or somehow test multiple keys simultaneously with less energy
> than required to "bump a single electron".
>
>>> scenario of being able to test a key with as little energy as needed
>>> to bump a single electron between two successive energy levels, and
>>> assuming that you are able to channel the whole energy produced by
>>> the Sun for the rest of its life (that's about 5 billion years), then
>>> exploring a 256-bit key space will still require a few billion stars
>>> -- i.e. an entire galaxy. Seems expensive.
>>>
>>> This basically shows that the current rate of computer advancement
>>> cannot plausibly be maintained for the next two hundred years. [...]
>
> Peter Duniho wrote:
>> I admit to not being fully versed in the theory involved. But the
>> Wikipedia article points out that the analysis to which you refer makes an
>> assumption about the computations that turns out to not be true.
>> Specifically, there are more efficient ways to do the computation,
>> obviating the theoretical energy requirements according to analysis you're
>> talking about.
>
> Lasers passed through holograms are able to elicit correlations in a
> massively parallel fashion. I'm sure they currently use far more energy than
> Thomas's "ultimately optimistic" projection, but one can imagine ways in
> which the massively parallel action surpasses the ratio of one key per
> electron "bump". One can also envision the use of currently impractical
> physics, such as string theory or tachyon transitions, to augment quantum
> effects in such a way as to exceed Thomas's "optimism".
>
> History shows us that it's dangerous to predict the impossibility of future
> advances. That by itself doesn't mean Thomas is wrong, only that it's
> dangerous to predict ultimate impossibility.

Clarke's first law:

When a distinguished but elderly scientist states that something is
possible, he is almost certainly right. When he states that something is
impossible, he is very probably wrong.

The correctness of Thomas's argument thus hinges on whether he is elderly :).

tom

--
taxidermy, high tide marks, sabotage, markets, folklore, subverting, .
From: Roedy Green on
On Thu, 25 Feb 2010 21:18:38 -0500, "Rhino"
<no.offline.contact.please(a)example.com> wrote, quoted or indirectly
quoted someone who said :

>user names and passwords on a Windows XP computer?

>I'm looking for an application that will store the data in a way that isn't
>readily decipherable by a hacker who gets on to the system or even a snoopy
>visitor to my house who happens to use the computer.

See http://mindprod.com/jgloss/password.html

In the links section are links to several such products. I use a free
program called Software safe.
--
Roedy Green Canadian Mind Products
http://mindprod.com

The major difference between a thing that might go wrong and a thing that cannot possibly go wrong is that when a thing that cannot possibly go wrong goes wrong it usually turns out to be impossible to get at or repair.
~ Douglas Adams (born: 1952-03-11 died: 2001-05-11 at age: 49)
From: Nigel Wade on
On Fri, 26 Feb 2010 20:16:46 -0500, Arne Vajhøj wrote:

> On 26-02-2010 04:50, Nigel Wade wrote:
>> I use eWallet for logon details, and other personal info.
>>
>> It's built on 256bit AES encryption. Not the most secure, but secure
>> enough to defeat most attacks.
>
> AES 256 bit is supposed to defeat any attacks.

Sorry, I did not intend to cause any confusion or concern. I am not an
expert on encryption, but I think there are more secure encryption
methods than 256bit AES. That's all I meant by "not the most secure". I
concede that that expression can also have other connotations - I did not
mean to imply that.

>
> Do you know about a vulnerability?

No. But then again, that doesn't preclude there being one in this
product. It's quite surprising how many encryption algorithms, which in
theory are uncrackable, turn out to be severely compromised by their
practical implementation.

--
Nigel Wade


From: Rhino on

"Tom Anderson" <twic(a)urchin.earth.li> wrote in message
news:alpine.DEB.1.10.1002270155540.15090(a)urchin.earth.li...
> On Fri, 26 Feb 2010, RedGrittyBrick wrote:
>
>> On 26/02/2010 02:18, Rhino wrote:
>>> I'm wondering if anyone here can recommend a secure way to store a list
>>> of
>>> user names and passwords on a Windows XP computer?
>>>
>>> I'm looking for an application that will store the data in a way that
>>> isn't
>>> readily decipherable by a hacker who gets on to the system or even a
>>> snoopy
>>> visitor to my house who happens to use the computer.
>>>
>>> I'm just trying to find a good way to store my various usernames and
>>> passwords for the gazillions of accounts that I have in one place or
>>> another....
>>>
>>> I used to have a nifty little app on my PDA called Memorizer (?) which
>>> used
>>> a non-conventional access method - you had to click on the correct
>>> surfaces
>>> in a complex shape to get in; once you were in, you simply have a nice
>>> text
>>> file that lets you write whatever you want, including usernames and
>>> passwords. That was handy because if I ever lost my PDA, I knew that no
>>> one
>>> would be able to look at my secret stuff. I'm looking for something
>>> similar
>>> on the PC.
>>>
>>> Any ideas?
>>
>> http://passwordsafe.sourceforge.net/
>
> Is the right answer.
>

Agreed. I downloaded and installed this, poked around with it a bit, and I'm
satisfied that this will meet my needs. Or at least my needs at home. I do
want to have a look at the web based solution that Jean-Baptiste Nizet
mention. I could see that being very handy when I travel and then need to
sign into one of my various infrequently used accounts....

--
Rhino