cogitech Offline Upload & Sell: On
|
Bifurcator wrote:
Well, a few things here.
1) The scanning and tracking is all automated. "They" don't need any resources that they don't already have. And I can tell you with relatives in the NSA that there is nothing that goes over your router that isn't scanned and filed, if said router is connected to the outside world - no matter the encryption level (unless you wrote your own and your a 200+ IQ wizard!).
"The first key-recovery attacks on full AES due to Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger were published in 2011.[22] The attack is based on bicliques and is faster than brute force by a factor of about four. It requires 2^126.1 operations to recover an AES-128 key. For AES-192 and AES-256, 2^189.7 and 2^254.4 operations are needed, respectively... though 2^200 operations would still take far longer than the age of the universe to complete." It should be noted that these are "academic" key-recovery attacks; mathematically proven to be possible, but never actually performed because it would take millions (billions? trillions?) of years to do so.
To surmise that authorities are decrypting and scanning one's AES-256 encrypted traffic in realtime is quite laughable. Even good old Blowfish is basically impossible to crack, unless you are on Jack Bauer's team http://www.schneier.com/blog/archives/2005/04/blowfish_on_24.html
|