Royee 10 Posted ... The NSA believes it’s on the verge of breaking a key encryption algorithm—opening up hoards of data. http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/5/ Doesn't just about everything use AES encryption ?! There I was thinking how secure I was adding a long password to my Zip files ! Quote Share this post Link to post
Baraka 32 Posted ... No, they're not anywhere close to breaking AES-128, 192 or 256. Look at the date. This is old news. Bruce Schneier has written about it in the past and has said many times that AES will take quite a bit of time to break- on the order of decades, centuries or even longer. AES-192 and 256 are considered good enough for top secret docs in the US. PGP (RSA asymmetric), on the other hand, may be broken over the next 10 or 20 years. THAT is pretty scary! And remember: regardless of the algorithm used, if your passphrase isn't long enough then a sufficiently powerful computer can guess it in a few days or even hours. No need for a such a passphrase for anything but whole disk encryption, PGP and other things where someone can seize your data and try to decrypt it an unlimited amount of times. 1 Royee reacted to this Quote Share this post Link to post
hashtag 151 Posted ... According to that article NSA has modifed supercomputers to target specific algorithms. Their priority would be AES. If you decide not to use AES then don't get a CPU that supports AES because it appears to slow down alternatives like Twofish. Twofish is actually faster than AES at 256-bit on most platforms.http://en.wikipedia.org/wiki/Twofishhttp://en.wikipedia.org/wiki/Serpent_%28cipher%29You can test password strength here.https://dl.dropboxusercontent.com/u/209/zxcvbn/test/index.html 2 Royee and Baraka reacted to this Quote Share this post Link to post
B0R3D 3 Posted ... You could use truecrypt instead even with a weak password. Quote Share this post Link to post
Baraka 32 Posted ... That's one of the worst ideas I've ever heard!!! Follow the logic here and you'll be just fine: https://xkcd.com/936/ Quote Share this post Link to post
Anonymous_13 31 Posted ... You could use truecrypt instead even with a weak password. There are a few decrypter tools for Truecrypt, even commercial ones like from Elcomsoft.I would rather take my hands of Truecrypt or Bitlocker if we're talking about security. Quote Share this post Link to post
Staff 9971 Posted ... You could use truecrypt instead even with a weak password. There are a few decrypter tools for Truecrypt, even commercial ones like from Elcomsoft.I would rather take my hands of Truecrypt or Bitlocker if we're talking about security. Hello, can you please elaborate? Kind regards Quote Share this post Link to post
hashtag 151 Posted ... This is how to crack a password.http://www.hacker10.com/other-computing/how-egyptian-police-quickly-cracked-journalists-computer-password/ Quote Share this post Link to post
B0R3D 3 Posted ... You could use truecrypt instead even with a weak password. There are a few decrypter tools for Truecrypt, even commercial ones like from Elcomsoft.I would rather take my hands of Truecrypt or Bitlocker if we're talking about security.There are bruteforce tools for it, but with multiple containers encased in one another on a hidden truecrypt volume, they would be absolutely useless. http://www.truecrypt.org/faq <<They say and I quote "it could take thousands or millions of years".In case you haven't noticed, Elcomsoft searches for keys if the true crypt volume is already mounted and you hibernated or locked out of your PC, searching for keys in memory dump and hibernation files!= decryption. This is solved here http://www.truecrypt.org/docs/hibernation-file. Quote Share this post Link to post
bayoumedic 2 Posted ... for added protection using truecrypt use some random file as a keyfile. But don't make a mistake i made and use a photo. I later was playing around with picasa and found out that it alters jpgs in some way, thus destroying the keyfile. (this also provides a good excuse as to why you cant give the feds access to the volume) Luckily I had a backup. A tip for creating a 64 char password that you can remember. And it IS important to have a strong password. Take a phrase you can easily remember and a salt, something like +$+ replace all spaces with the salt then somewhere add a block of random characters that don't for a word, be sure to use caps somewhere. Also in truecypt select never save history. Under settings there are options to auto-dismount including a set idle time to dismount. Check the preserve modification timestamp so you can say 'I haven't used that file in forever, i don't remember that password' You can also set hot key to force a dismount and then close truecrypt. If you are really worried about the security of your computer type in your password using the onscreen keyboard to bypass any keyloggers that may be installed without your knowledge. One good use for a TC volume is to hold a virtual machine but if you don't want to go that route you can use sandboxie to run apps virtually inside the volume. If you were to run a p2p or browser in sandboxie then the browser history, cookies, acquired malware adware, virus and whatever else you suck off the net will be nicely contained inside your volume. If a program that is running inside of sandboxie opens up another program then it too is in the sand box. It's nice. ....sorry, my adderall just kicked in. 1 Royee reacted to this Quote Share this post Link to post
Royee 10 Posted ... thanks bay that is some good information there, I can see have a long way to go to mastering and understanding security and anonymity, as my friend always said big brother is watching us ! Quote Share this post Link to post