А для крутых парней - барабаны!!!

Oct 08, 2013 13:19

За последние несколько месяцев я пару раз писал про откровения Сноудена в русле "и они с этой хохмой в Одессу собираются приехать?" - то есть не заметил особенно интересных открытий для людей, профессионально интересующихся компьютерной безопасностью и криптографией. Вернувшись из отпуска, я решил одним глазком глянуть, что же нового появилось по ( Read more... )

nsa

Leave a comment

dwarkin October 8 2013, 20:32:17 UTC
зря ;)

http://en.wikipedia.org/wiki/Data_Encryption_Standard

вот цитата:

Some of the suspicions about hidden weaknesses in the S-boxes were allayed in 1990, with the independent discovery and open publication by Eli Biham and Adi Shamir of differential cryptanalysis, a general method for breaking block ciphers. The S-boxes of DES were much more resistant to the attack than if they had been chosen at random, strongly suggesting that IBM knew about the technique in the 1970s. This was indeed the case; in 1994, Don Coppersmith published some of the original design criteria for the S-boxes.[10] According to Steven Levy, IBM Watson researchers discovered differential cryptanalytic attacks in 1974 and were asked by the NSA to keep the technique secret.[11] Coppersmith explains IBM's secrecy decision by saying, "that was because [differential cryptanalysis] can be a very powerful tool, used against many schemes, and there was concern that such information in the public domain could adversely affect national security." Levy quotes Walter Tuchman: "[t]hey asked us to stamp all our documents confidential... We actually put a number on each one and locked them up in safes, because they were considered U.S. government classified. They said do it. So I did it".[11] Bruce Schneier observed that "It took the academic community two decades to figure out that the NSA 'tweaks' actually improved the security of DES."[12]

Reply

zyama_krendel October 9 2013, 17:04:47 UTC
Уау!.. Круты!

Reply


Leave a comment

Up