What's new

Details regarding Mossad Pak origin agent arrested from lahore

.
Pray, tell me then, what kind of Decryption mechanism will you use, in case the sender sends the the Data encrypted using some random generated 256-bit (say) key which only the intended receiver can receive using the said random key and No intermediate sniffers can break-in, as RSA is robust enough not be broken by any amount (unless Pakistan has a state of the art Cray blades) of processing for that currently generated random key.

Unless of course, you route your sensitive data to a SuperComp to your friend uphill, which again is out of the question, i am much interested in knowing what SuperTech does Pakistan possess to decrypt this.

Why should I bother to identify the system to you?
Not my department anyway.. mine was comsec.. which means my x-bit keys were broken by the system.. thats all I bother with.
You have problems accepting it, YOU DISPROVE IT.
 
.
@Oscar, mate, I thought you were a Doctor! :blink:
 
Last edited by a moderator:
.
Maybe Blowfish / Twofish? I highly doubt Threefish / Custom and realtime Quantum deciphering! I mean we lack the 'hardware' for that.

Whatever, the point is you are never supposed to catch 'spies' you're supposed to watch what they are watching.

Nothing that sophisticated..
but it gave us a run for our money with AES(256) .. and STANAG voice compression imitations.
 
.
Pray, tell me then, what kind of Decryption mechanism will you use, in case the sender sends the the Data encrypted using some random generated 256-bit (say) key which only the intended receiver can receive using the said random key and No intermediate sniffers can break-in, as RSA is robust enough not be broken by any amount (unless Pakistan has a state of the art Cray blades) of processing for that currently generated random key.

Unless of course, you route your sensitive data to a SuperComp to your friend uphill, which again is out of the question, i am much interested in knowing what SuperTech does Pakistan possess to decrypt this.

You expect him to discuss that on a public forum... Waa Waa!
 
.
Why should I bother to identify the system to you?
Not my department anyway.. mine was comsec.. which means my x-bit keys were broken by the system.. thats all I bother with.
You have problems accepting it, YOU DISPROVE IT.
:lol: That is laughable at best and self-depracating at worst. Okay, let me start off with a simple opensource iPhone App. Former SEALs Market iPhone App That The Government Hates.
"The first rule," Buzzfeed staffer Russell Brandom writes, "former Navy SEAL Mike Janke tells me, is that you have to assume the worst: 'Everything you do and say — email, text, phone — is monitored on some level.'"
.
.
.
First, technically speaking — even if Silent Circle was brought in front of Congress, or their records were subpoenaed, the structure of Silent Circle prevents it from disclosing any user information. Why? Because the App uses the iPhone CPU to encrypt the data. Any data that leaves the iPhone leaves as total, military grade gobbledy gook, until it reaches another subscriber, in which case it is unscrambled.

Ahhh, but what about the encryption key? A new one is created and erased for every transmission, making each transmission completely, and perpetually indecipherable.
The SEALs with utter confidence have marketed that this App will pass the "NSA test" which Pakistan can buy and test out. Mind you, the Source code and Algorithms will still be with the SEALs. What i am coming to is, if the SEALS are confident that the NSA, an information behemoth may not be able to crack through their system, i am very much curious what blade servers/racks does Pakistan possess which will help them process and break through a randomly-generated x-length key.
 
. .
You expect him to discuss that on a public forum... Waa Waa!

Apparently.. all of these "partially" knowledgeable Indians expect everything to be garlanded and published for them to actually accept it.
Which is why their secondary hobby here apart from pooh-poohing everything Pakistani is asking around for links...
The actual knowledgeable ones, those that have worked on "actual" important projects in the concerned industry.. know the other side and what is being talked about.

:lol: That is laughable at best and self-depracating at worst. Okay, let me start off with a simple opensource iPhone App. Former SEALs Market iPhone App That The Government Hates.

The SEALs with utter confidence have marketed that this App will pass the "NSA test" which Pakistan can buy and test out. Mind you, the Source code and Algorithms will still be with the SEALs. What i am coming to is, if the SEALS are confident that the NSA, an information behemoth may not be able to crack through their system, i am very much curious what blade servers/racks does Pakistan possess which will help them process and break through a randomly-generated x-length key.

Adding a smily doesnt change a thing. So if the seals are confident enough.. then the NSA should test it out.
How does this have relavance to the bold may I ask?
Or are you simply trying to show somehow that you know that Pakistan has no such thing?
If you know.. then make the statement stating so and so reasons.

Whats with the cheesy smart-arse attitude..it gives of a sense of having read up too much without having any actual knowledge.
 
. .
Adding a smily doesnt change a thing. So if the seals are confident enough.. then the NSA should test it out.
How does this have relavance to the bold may I ask?
Or are you simply trying to show somehow that you know that Pakistan has no such thing?
If you know.. then make the statement stating so and so reasons.

Whats with the cheesy smart-arse attitude..it gives of a sense of having read up too much without having any actual knowledge.
Okay, i am willing to go out on a limb and give you the benefit of the doubt. Assuming as you said in an earlier post of using AES-256, can you give me what order of complexity will your key-recovery algo. be ? Surely this is not such a secret worth preserving for you guys, i am not asking the algo. to break-open.
 
.
Okay, i am willing to go out on a limb and give you the benefit of the doubt. Assuming as you said in an earlier post of using AES-256, can you give me what order of complexity will your key-recovery algo. be ? Surely this is not such a secret worth preserving for you guys, i am not asking the algo. to break-open.

If you are suggesting a brute -force technique then you can wait for say... lets say..trillion years.
Surely you cant be suggesting that??

let me give you an a possible angle
http://crypto.rd.francetelecom.com/events/eurocrypt2010/talks/aes.pdf

Let me give you another angle.. You dont have to "break" the algo if you have a list of keys known to work.
getting the latter is where the focus is.
For eg.. all radios that use that system.. have something known as a "kill switch".. which wipes the keys clean.
These keys can be kept in storage.. encrypted themselves..within memory.
if you can get to those keys.. problem solved
 
.
No body is asking what keys RAW uses ? or Mossad? some knowledge must be shared.
 
.
Back
Top Bottom