Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Encryption Government Privacy United States

NSA Building US's Biggest Spy Center 279

New submitter AstroPhilosopher writes "The National Security Agency is building a complex to monitor and store 'all' communications in a million-square-foot facility. One of its secret roles? Code-breaking your private, personal information. Everybody's a target. Quoting Wired: 'Breaking into those complex mathematical shells like the AES is one of the key reasons for the construction going on in Bluffdale. That kind of cryptanalysis requires two major ingredients: super-fast computers to conduct brute-force attacks on encrypted messages and a massive number of those messages for the computers to analyze. The more messages from a given target, the more likely it is for the computers to detect telltale patterns, and Bluffdale will be able to hold a great many messages. "We questioned it one time," says another source, a senior intelligence manager who was also involved with the planning. "Why were we building this NSA facility? And, boy, they rolled out all the old guys—the crypto guys." According to the official, these experts told then-director of national intelligence Dennis Blair, "You’ve got to build this thing because we just don’t have the capability of doing the code-breaking." It was a candid admission.'"
This discussion has been archived. No new comments can be posted.

NSA Building US's Biggest Spy Center

Comments Filter:
  • Re:a thought (Score:1, Informative)

    by MetalliQaZ ( 539913 ) on Friday March 16, 2012 @01:12PM (#39379733)

    Yes, you could, but it would be useless. You would then have to transmit the new key to your recipient for every message. If they can intercept the message, they would get your keys also.

    Anyway AES is public key encryption. I think you meant passphrase, not key. In any case, the same problem applies.

    What you are getting at is called a one-time-use pad. It is pretty much the most secure form of protection, but also very unwieldy for Joe Everyman.

    -d

  • Re:How many bits? (Score:5, Informative)

    by Black Parrot ( 19622 ) on Friday March 16, 2012 @01:15PM (#39379783)

    How many bits should we use for encryption now?

    If you assume peak computing power is doubling ever n years, they you need one more bit every n years to keep ahead.

    And of course, whatever you use now will be breakable in the future, if anyone cares to save your messages until computing catches up.

  • by Anonymous Coward on Friday March 16, 2012 @01:17PM (#39379801)

    The whole we-can't-break-codes-anymore story is told in

    http://www.amazon.com/Coded-Messages-Hoodwink-Congress-People/dp/0875868142/ref=sr_1_1?ie=UTF8&qid=1331918025&sr=8-1

    Coded Messages: How the CIA and the NSA Hoodwink Congress and the People

    by Nelson McAvoy, former NSA person, who claims to have been at the early meetings from when the NSA was formed.

  • Re:a thought (Score:5, Informative)

    by zill ( 1690130 ) on Friday March 16, 2012 @01:27PM (#39379937)

    Anyway AES is public key encryption.

    AES is a symmetric-key algorithm.

  • Re:Brute force.... (Score:2, Informative)

    by RenderSeven ( 938535 ) on Friday March 16, 2012 @01:36PM (#39380065)

    All the hand-wringing is because certain politicians are upset that we're not stealing all of it from the haves.

    FTFY

  • by digitig ( 1056110 ) on Friday March 16, 2012 @02:07PM (#39380453)
    Or French, or American [wikipedia.org].
  • Re:How many bits? (Score:4, Informative)

    by TheTrueScotsman ( 1191887 ) on Friday March 16, 2012 @02:18PM (#39380579)

    There's no way they can crack AES-128 unless there's a hole in the algorithm or they have quantum computing.

    Current best practices are:

    1) AES-128 to AES-256 for symmetric keys (although AES-256 has its own problems which can sometimes collapse it to AES-128 - these are ameloriated by increasing the key rounds)

    2) 2048-bit to 4092-bit for RSA keys (2048 may be breakable by 2030 with conventional computing, 4092-bit will take much longer).

    If quantum computing becomes feasible then AES keys will effectively halve in complexity (i.e. AES-128 goes to 64-bit, AES-256 goes to AES-128) and RSA and DSA keys will be useless.

  • by Maximum Prophet ( 716608 ) on Friday March 16, 2012 @02:22PM (#39380635)
    Everyone used one time pad for all of their clandestine agent communications. OTP, it's the only way to be sure.

    See http://en.wikipedia.org/wiki/Number_stations [wikipedia.org]

    Using an image has problems in that they are not random, so are subject to analysis. If you stripped the headers, and used an "image" of captured static, it might be good enough, but almost anything organic like a photo of a tree, will have patterns in it.

Machines have less problems. I'd like to be a machine. -- Andy Warhol

Working...