It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Even then, why would you waste 1.4 gig's of HDD space not knowing what it is, since if it's really that big, it will be all over the media soon enough.
Originally posted by DGFenrir
reply to post by Dark Ghost
And WikiLeaks hasn't released any sensitive enough info yet.
[edit on 31/7/2010 by DGFenrir]
Originally posted by muzzleflash
And no one can decrypt it?
Why?
Because you don't decrypt military encryption,
military encryption decrypts you!
This proves someone is giving him the Cipher from the inside.
The only way someone could be giving him this is from like the NSA. Seriously this is messed up.
He must be a plant. Wikileaks must be a front. Obviously with NSA level decryption abilities. (He has top secret Ciphers)
No hackers in the basements are gonna break that. AES256 with a decent pass key? Holy crap man that would take forever to crack with brute force, you NEED the cipher seriously.
Who do they think they are fooling by being so blatant about this?
I did some research on this stuff too. I will share a little bit of it if anyone is interested.
Until May 2009, the only successful published attacks against the full AES were side-channel attacks on some specific implementations. The National Security Agency (NSA) reviewed all the AES finalists, including Rijndael, and stated that all of them were secure enough for U.S. Government non-classified data. In June 2003, the U.S. Government announced that AES may be used to protect classified information: The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths.The implementation of AES in products intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and use."[8] AES has 10 rounds for 128-bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys. By 2006, the best known attacks were on 7 rounds for 128-bit keys, 8 rounds for 192-bit keys, and 9 rounds for 256-bit keys
en.wikipedia.org...
But really read the whole article there it's quite fascinating.
Also, another link I read.
www.dekart.com...
Really just type in "How hard is AES 256 to crack?" into Google and tons of stuff comes up, almost all of it is extremely interesting and eye opening.
Granted I am not a expert in encryption by any means, I am just a guy who reads stuff and thinks about it
The only way someone could be giving him this is from like the NSA. Seriously this is messed up.
Originally posted by de Thor
Has anyone read the book Digital Fortress by Dan Brown?
This hacker has incriminating info about the government and he posts an encrypted file online. NSA tries to crack it with their huge supercomputer but come to realize that they actually downloaded a virus and now he has access to all of the NSA's top secret files.
Could be a stretch, but something to think about?