Using supercomputers to break interesting ciphers
Tim May
tcmay at got.net
Sat Sep 1 14:47:16 PDT 2001
On Saturday, September 1, 2001, at 01:53 PM, Faustine wrote:
> Tim Wrote:
>>> On Friday, August 31, 2001, at 11:43 AM, Faustine wrote:
>>
>>> Consistent with your misconception about big computers being useful
>>> for
>>> brute-force cryptanalyis,
>>
>> I never said that and you know it. Nice troll, though.
>
>> You did indeed. Several times you alluded to what big and powerful
>> computers the NSA must have, the better to blow our house down. When it
>> was pointed out to you the nature of brute-forcing a big key, and how
>> useless computers are, you seemed not to get the point.
>
> Oh, well that might have a little something to do with the fact that I
> never made the point that brute-forcing keys was the way big and
> powerful
> NSA computers are going to blow our house down, mightn't it. The fact
> that "brute-forcing keys" was the only thing you could think of when you
> saw my phrase "interesting possibilities for cryptographic applications"
> and then chose to fixate on proving what a damn poopy head
> whippersnapper I
> am instead of deigning to bother over what methods I meant to refer to
> is
> indicative of your own limitations, not mine.
You are now backpedaling furiously away from your "common to newbies"
claim that fast computers might be used to break ciphers. Here's a chunk
of dialog from an August 8 post of yours:
(comments after ">" are from Tim)
>Except when was the last time you heard of a Cypherpunks-interesting
>cipher being broken with _any_ amount of computer crunching?
"Since when did people stop trying? The last time I heard a researcher
talk
about trying to break a Cypherpunks-interesting cipher was last
Thursday."
This, and similar comments you made about the Sandia and IBM
supercomputers, clearly imply you think one of the uses of these
supercomputers is to "try" to break what I called
Cypherpunks-interesting ciphers.
Many who are exposed to crypto to the first time, and who haven't
thought about the issue of factoring large numbers, simply "assume" that
a worthwhile goal is to "try" ("Since when did people stop trying?") to
break such ciphers with faster computers.
(To be sure, there are interesting projects on faster factoring methods,
better quadratic sieves, searches for Mersenne primes, all that good
number theory stuff. Some of it is even being done at Sandia. But this
is a far cry from the common belief that Cypherpunks-interesting ciphers
may fall to attacks with mere supercomputers. Do the math on what a
trillion such Sandia computers could do if they ran for a billion
years...then realize there are keys already in use today which cannot be
attacked by brute-force (or probably any other direct means) with all of
the computer power that the universe could ever support. Mind-boggling,
but I realized this via some calculations just after starting to look
closely at RSA.)
You are now backpedalling, claiming you never meant this.
Similar to the way you claimed "if someone else is convinced it's
interesting enough to be willing to food the power bill (as I had
anticipated would be the case)," well AFTER I posted an article pointing
out that the power bill alone for running older Pentiums and G3s would
pay for faster new CPUs to make the old DIY machines a waste of time.
Fact is, you HADN'T "anticipated" this...you saw my calculations of
watts and MIPS and only _then_ did you retroactively "anticipate" that
power concerns make such arrays of old machines a lose. Check the
archives. When some adds a gratuitous "As I had anticipated would be the
case" under these circumstance we know we are in the presence of a faker.
--Tim May
More information about the cypherpunks-legacy
mailing list