It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
MSDN - ENCRYPT IT
AES is a new cryptographic algorithm that can be used to protect electronic data. Specifically, AES is an iterative, symmetric-key block cipher that can use keys of 128, 192, and 256 bits, and encrypts and decrypts data in blocks of 128 bits (16 bytes). Unlike public-key ciphers, which use a pair of keys, symmetric-key ciphers use the same key to encrypt and decrypt data. Encrypted data returned by block ciphers have the same number of bits that the input data had. Iterative ciphers use a loop structure that repeatedly performs permutations and substitutions of the input data.
Originally posted by cccchunt
Just curious but don't you think blowfish 256 bit encryption would work for security?? I don't know of too many people who have programs to break this code if you put your encryption alogrithm at - say 20 characters. It would take probably years to break your email.
I might be way off base on this but seems to me it would work very well. The Govt or whoever probably does not have time to be trying to break code of people emailing each other. Let me know what you think.
Originally posted by double down
Smoke signals, We've killed off most of the people who know how to read them so this is underated in matters of national security, just a thought.
Originally posted by AD5673
REALLY electronicly there isnt a secure communications connection.
Originally posted by zzub
Entangled photon pairs would in theory give secure, instant communication over any distance.
Originally posted by Jake_Yes, I agree with you. All of my internet communications go through my ISP's computers, which can do whateverthehell they want with the data.
Originally posted by amantine
If you use a one-time pad and they don't find the key, they can't break the cipher. Even if you use an ancient cipher like the Vigenere cipher. Because a one-time pad is of the same length as your message and is used only once, it is almost impossible to break, because the key never repeats. Maybe with ancient ciphers they can find out what language the encoded text is by using statistic analysis.
If you use a one-time pad with more advanced symmetric key ciphers like TripleDES or AES, they can never break the code.
Originally posted by amantine
You do have to go through all the trouble of getting the one-time pad to the person you're communicating.
Originally posted by cccchunt
Just curious but don't you think blowfish 256 bit encryption would work for security?? I don't know of too many people who have programs to break this code if you put your encryption alogrithm at - say 20 characters. It would take probably years to break your email.
I might be way off base on this but seems to me it would work very well. The Govt or whoever probably does not have time to be trying to break code of people emailing each other. Let me know what you think.
Chris
My point with the password protected online game is security via stealth. If nobody knows that my intent is to exchange information then it looks for all the world like I am playing a game. By swapping encrypted email or attached files you are virtually shouting "I am sending sensitive information!" from the rooftops. Also, I am talking about hosting the game myself rather than using a commercial server. The password is to keep the casual troll-gamer from hooking up to my server that he/she has detected using a port scan.
There are quite a few reasonably same encryption algorithms (that take quite some time to break): TripleDES, Blowfish, RSA, etc.
Can one-time pad encrypted text be broken with brute force (id est, trying every possible combination of keys)?
Are 'TripleDES' and 'AES' just methods of generating a key?
Originally posted by Blackout
Don't trust 3DES. 3DES has its roots from DES, a very unreliable encryption. With even a "lower-end" supercomputer, this can be cracked quickly. Blowfish was a candidate for government encryption so I'm not too sure if you would want to trust that if you're trying to avoid the government lol. Don't trust RSA. Period. The famed MD5 hashing algorithm from RSA has already been discovered to have a collision. Therefore, although the MD5 algorithm may seem secure, I highly recommend you don't take your chances with MD5 especially with personal information.