Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security

Israeli Firm Claims Unbreakable Encryption 728

Several readers have pointed to an Israeli company's claim of achieving unbreakable encryption. The linked article reports this claim uncritically. Do you think there's such a thing as unbreakable encryption? This isn't the first time someone's made this claim, or second, or third ...
This discussion has been archived. No new comments can be posted.

Israeli Firm Claims Unbreakable Encryption

Comments Filter:
  • One Time Pad (Score:5, Informative)

    by Overand ( 590318 ) on Tuesday February 11, 2003 @05:15AM (#5277877) Homepage
    One Time Pad is uncrackable... but the "key" is the same size as all the data you'll ever want to send... but DAMN it works. =]
  • by boomgopher ( 627124 ) on Tuesday February 11, 2003 @05:21AM (#5277913) Journal
    They use a 1 MB key to encrypt the data, whee.

    It's not theoretically unbreakable, just practically unbreakable with today's technology.
  • by szo ( 7842 ) on Tuesday February 11, 2003 @05:24AM (#5277932)
    With hardware. Geiger-Müller for example. Or measuring thermic movement of certain electrons.

    Szo
  • Hmm, questions... (Score:2, Informative)

    by mtnharo ( 523610 ) <greengeek AT earthlink DOT net> on Tuesday February 11, 2003 @05:26AM (#5277940) Homepage
    Anyone think there is any truth to their claims of one million bit encryption? Seems like it would take an awful long time to work with, too long to be really usefull. I thought 4096 keys for current methods were deemed strong enough for at least a few years. Hell, we just had an article about 1024 bit keys needing 1 year and/or large quantities of $$$ to break, how can they claim everything else has been broken in the last 5 years (Brute forced doesn't matter. Anything can be cracked given enough time, flawed methods = cracks without major work for many keysets), and that competing techs use only 256 bits? Hmmm... this needs some investigating. I do like the bit about the NSA wanting to prevent them from exporting(just like every non-flawed encryption system). PGP went through the same thing if I recall correctly, and there were "do not export to warnings" on IE just for having 128-bit SSL. Seems like this may be a little bit of hype and marketing to dig through.

    (Congrats and Kudos to them if they pulled it off, but I remain skeptical as always until I see some full-on analysis from experts in the field, not a brochure-derived article)
  • VME was broken (Score:5, Informative)

    by eddy ( 18759 ) on Tuesday February 11, 2003 @05:38AM (#5277987) Homepage Journal

    I haven't read the article (c'mon!) but I saw the mentions of VME, which...well... was broken [google.com].

    It's snakeoil. Just marketing, no security. Move along. Nothing to see here.

  • Re:Nope (Score:3, Informative)

    by Anonymous Coward on Tuesday February 11, 2003 @05:38AM (#5277988)
    That would be on the assumption that they using security through obscurity, which is hopefully not part of it.

    Unbreakable encryption is quantum encryption.

  • Re:VME was broken (Score:2, Informative)

    by eddy ( 18759 ) on Tuesday February 11, 2003 @05:41AM (#5277997) Homepage Journal

    Okay, that was just the decryptor, but IIRC it was broken (found weak) also elsewhere in sci.crypt. Bruce Schneier mentions them back in 1999... in his snakeoil column.

  • Re:One Time Pad (Score:5, Informative)

    by jtdubs ( 61885 ) on Tuesday February 11, 2003 @05:43AM (#5278008)
    Also of note:

    You CAN NOT use the same pad more than once. Hence the name "One-time" pads. Here's why:

    Here are two messages, encrypted with the same pad:

    cyphertext1 = plaintext1 + one-time-pad
    cyphertext2 = plaintext2 + one-time-pad

    For short:

    c1 = p1 + otp
    c2 = p2 + otp

    Now, I get ahold of both cyphertexts, and I suspect, or guess, that they were encrypted with the same key.

    (c2 - c1) = (p2 + otp) - (p1 + otp)
    (c2 - c1) = (p2 - p1)

    So, now, the "enemy" has a new set of numbers, obtained by the subtraction of the two cyphertexts, and this result is also the subtraction of the two plaintexts as the one-time-pads cancelled out.

    A message that is simply the difference between two plaintext messages is trivially crackable via statistical analysis.

    Anyone who enjoys encryption theory and a good yarn should go pick up a copy of Neal Stephenson's Cryptonomicon. It is one of the best book I have ever read.

    Justin Dubs
  • Re:One Time Pad (Score:5, Informative)

    by Des Herriott ( 6508 ) on Tuesday February 11, 2003 @05:52AM (#5278043)
    Quantum cryptography has the potential to solve problem (2) - it allows (what appears to be) truly secure key distribution by exploiting the quantum properties of photons. It's gone beyond the theoretical stage, and quantum channels have even been established through air (as opposed to a fibre-optic link).

    Problem (1) is really hard to do well. And, no, a cheap soundcard is not the answer :)
  • Re:old news (Score:1, Informative)

    by Anonymous Coward on Tuesday February 11, 2003 @06:09AM (#5278097)
    Bruce Schneier commented [counterpane.com] this "crypto" as early as 4 years ago in his newsletter under the title: "Pseudo-mathematical gobbledygook"...;-)

  • by Twylite ( 234238 ) <twylite&crypt,co,za> on Tuesday February 11, 2003 @06:29AM (#5278157) Homepage

    In Applied Cryptography, Schneier has a lovely explanation of why you can't brute force a 256 bit key. IIRC it comes down to there not being enough quantums (of time) between now and the end of the universe to check every possible key if every atom can perform on calculation per quantum. He also explains why its not physically feasable to brute force a 128 bit keyspace.

    So what is comes down to is this: either you find a weakness in the algorithm, or work on quantum computing until it can brute force huge keyspaces outside the normal constraints of physics. Until then, 128 bits is enough (for symmetric crypto).

    Actually reading the Meganet site is laughable. They attribute stolen credit card details to poor or broken cryptography (reality: this data isn't kept encrypted on the site host, because the security architecture of most sites sucks).

    The algorithm they claim is uncrackable is based on a random "matrix", which is derived from a "file of any size that is available ..." on both sending and receiving computers. So there IS secret data that must be transferred (or else that file is public, even worse). According to the code available here [google.com], the values aren't even vaguely random - just do lots of XORs using bits from your "secret file".

    Meganet tries to justify its claims by pointing to multiple encryption. Big news guys: the size of the keyspace determines security, not the number of times you encrypt with the same key. At best multiple encryption makes it take longer to brute force the keyspace. It doesn't add security. Period.

    Apart from that this matrix is used as a lookup table. That means that it has all of the problems of a one time pad, without the benefits. As soon as you use any block of values from the matrix again, you have information that you can use to attack the encryption.

    It may be true that noone has broken this algorithm. I've written crypto algorithms that noone has broken ... because I've never published them, and noone has had an interest in breaking them. That doesn't make them secure. Cryptographic security is achieved using simple algorithms that can be proven, using mathematical theory, not attested to by supposition and lame tests.

  • by SLOGEN ( 165834 ) on Tuesday February 11, 2003 @06:37AM (#5278174) Homepage
    From article:
    patented non-linear data mapping technology, called VME (Virtual Matrix Encryption)

    From the patent:
    A data security method and apparatus that provides an exceptional degree of security at low computational cost. The data security arrangement differs from known data security measures in several fundamental aspects. Most notably, the content of the message is not sent with the encrypted data. Rather, the encrypted data consists of pointers to locations within a virtual matrix, a large (arbitrarily large), continuously-changing array of values. The encryption technique is therefore referred to as Virtual Matrix Encryption. Furthermore, the data security arrangement uses a very large key of one million bits or more which creates a level of security much higher than any other existing method. The key is not transferred but is instead created from a file of any size that is available on both a computer used to send a secure message and a computer used to receive a secure message. The term Virtual Key Cryptographic as used herein to refer to techniques in which a key is recreated at a remote location from an electronic file without any transmission of the key itself. The file may be a system file, a file downloaded from the Internet, etc. A smaller, transaction-specific key, e.g., a 2,048 bit key, is sent end-to-end and is used in conjunction with the very large key to avoid a security hazard in instances where the same file is used repeatedly to create the very large key.


    So, it would _seem_ a bit like:

    1. build matrix:

    A B C
    D E F
    G H I

    2. to cipher up the letter F which is at row 2, col 3 send (2,3).

    3. mutate matrix, goto 2

    So the real "crypto" lies in the mutation of the matrix... how that is done is not described... maybe it's just x-or'ed onto itself or whatnot.

    The way the key is found has nothing to do with the value of the crypto, so don't even begin to critisize how easy it must be for an attacker to guess which file is being used as key.
  • by Joe Enduser ( 527199 ) <joe.enduser@kids ... l ['mfa' in gap]> on Tuesday February 11, 2003 @06:42AM (#5278185) Homepage
    This fpp.co.uk is David Irving's site. He is the guy who denies the holocaust. More on Mr.Irving: http://www.geocities.com/irving_challenger/
  • Re:One Time Pad (Score:5, Informative)

    by lars_stefan_axelsson ( 236283 ) on Tuesday February 11, 2003 @06:46AM (#5278195) Homepage
    One solution is to use a universally accessible pad that's pre-agreed upon. Like, "download CNN.com at precisely 5:00am, convert it to binary, and use that."

    That's a book cipher, and it's not a one time pad. There's a lot of structure in your pad material.

    No, the problem is still the random source. If you have two sources that produce the same key stream they are not "random" in the sense that we mean. And if you distribute (broadcast) the pad, then you have the key distribution problem again.

    Not to say that book ciphers cannot (and have not) been used to good effect. But one-time-pads they're not.

  • Snake oil since 1999 (Score:5, Informative)

    by ronys ( 166557 ) on Tuesday February 11, 2003 @06:56AM (#5278226) Journal
    Professional cryptographer Bruce Schneier used these guys as the exemplar for "Pseudo-mathematical gobbledygook" in the February 1999 issue [counterpane.com] of his monthly crypto-gram newsletter [counterpane.com]:

    "The base of VME is a Virtual Matrix, a matrix of binary values which is infinity in size in theory and therefore have no redundant value. The data to be encrypted is compared to the data in the Virtual Matrix. Once a match is found, a set of pointers that indicate how to navigate inside the Virtual Matrix is created. That set of pointers (which is worthless unless pointing to the right Virtual Matrix) is then further encrypted in dozens other algorithms in different stages to create an avalanche effect. The result is an encrypted file that even if decrypted is completely meaningless since the decrypted data is not the actual data but rather a set of pointers. Considering that each session of VME has a unique different Virtual Matrix and that the data pattern within the Virtual Matrix is completely random and non-redundant, there is no way to derive the data out of the pointer set." This makes no sense, even to an expert.

  • Re:One Time Pad (Score:3, Informative)

    by 1u3hr ( 530656 ) on Tuesday February 11, 2003 @07:18AM (#5278300)
    One time pads are not uncrackable by definition. They have two weak points.
    1) The generation of the pads.

    The article says "Meganet offers a patented non-linear data mapping technology, called VME (Virtual Matrix Encryption), that creates exceptionally random cipher text". So this is how the "onetime pad" is generated, and this has always turned out to have a weakness. "Real" onetime pads are generated by random natural processes, such as cosmic rays, not from a mathematical seed.

  • by Anonymous Coward on Tuesday February 11, 2003 @07:19AM (#5278303)
    "Note that the use of Israelis and Jews as synonyms."

    Well yes they are basically the same, didn't you know Israel is supposed to be the land of the Jews ? Want to move to Israel and buy some land there ? Good luck if you're not a Jew. It is a racist country, and Jews themselves don't deny it, that's one the reason it was created.
  • by LX.onesizebigger ( 323649 ) on Tuesday February 11, 2003 @07:23AM (#5278320) Homepage

    If I recall correctly, it was actually first deciphered by the agents of the Technical Office in Stockholm, Sweden and, neutral as Sweden was, leaked to the U.S.

  • by fulgan ( 116418 ) on Tuesday February 11, 2003 @07:33AM (#5278356)
    If VME had ever put this out for that kind of money for a genuine trial, it would have been all over the Net.


    While I agree with everything else you said, I remember about this particular instance of "please do our job for us": It WAS all over the net about two years ago except there wasn't a "one million dollar price" (but there was a Ferrari). Of course, it make everybody laugh at the time as well except a few scientists in the fields who where pretty much annoyed over the fact that not only did they more or less publically accused them of being incompetents, but they also didn't provide the testers with:

    1/ The algorythm used.
    2/ Anything but the cyphertext.

    Failing to provide any of these would have disqualified the "trial" as to being a test of the algorythm efficiency so failing both speaks for the effort the company make in helping peer review.
  • The patent claim (Score:2, Informative)

    by ickle_matt ( 122935 ) on Tuesday February 11, 2003 @07:34AM (#5278360)

    A data security method and apparatus that provides an exceptional degree of security at low computational cost. The data security arrangement differs from known data security measures in several fundamental aspects. Most notably, the content of the message is not sent with the encrypted data. Rather, the encrypted data consists of pointers to locations within a virtual matrix, a large (arbitrarily large), continuously-changing array of values. The encryption technique is therefore referred to as Virtual Matrix Encryption. Furthermore, the data security arrangement uses a very large key of one million bits or more which creates a level of security much higher than any other existing method. The key is not transferred but is instead created from a file of any size that is available on both a computer used to send a secure message and a computer used to receive a secure message. The term Virtual Key Cryptographic as used herein to refer to techniques in which a key is recreated at a remote location from an electronic file without any transmission of the key itself. The file may be a system file, a file downloaded from the Internet, etc. A smaller, transaction-specific key, e.g., a 2,048 bit key, is sent end-to-end and is used in conjunction with the very large key to avoid a security hazard in instances where the same file is used repeatedly to create the very large key.

    The patent [uspto.gov]
  • Meganet's Algorithm (Score:2, Informative)

    by Anonymous Coward on Tuesday February 11, 2003 @07:35AM (#5278364)
    http://patft.uspto.gov/netahtml/srchnum.htm patent #6,219,421

    The flaw is that the starting "matrix" must be shared. It's essentially a symmetric key or shared secret algorithm, with the disadvantage being that the shared secret is overtly large. Example entropy sources to reconstruct the matrix suggested in the patent include "system files" or "files downloaded from the Internet".

    Thus, it is impossible for the algorithm to be stronger than the method relied on to reconstruct the matrix at the receiving end. A file is most likely to be used to do this, so breaking an instance of ciphertext is likely to be an exercise in guessing which file(s) available to the receiving computer would be used to construct the decryption matrix.

    If one has available a secure means to share the matrix construction file(s), one could presumably forego the VME encryption altogether and use the same means to pass the message itself.

    The algorithm is designed to do nothing but encrypt or decrypt an arbitrary number of bytes. It does not address key exchange. If an implementation contains any other weaknesses through oversight, such as not padding plaintext to a sufficiently large block and passing any check information out of band to detect transmission errors, compromise could occur through those weaknesses.
  • by Anonymous Coward on Tuesday February 11, 2003 @07:44AM (#5278404)
    Bruce Schneier covered this way back in February 1999:

    http://www.counterpane.com/crypto-gram-9902.html [counterpane.com]

    I think we can file this under "snake oil".
  • by fortinbras47 ( 457756 ) on Tuesday February 11, 2003 @07:47AM (#5278413)
    Mathematically speaking, its basically impossible to prove that some encryption algorithm is intractably difficult to solve. (If for example you show the decryption process is NP complete, that just shows that the worst case is likely to be difficult if P != NP etc...)

    However, strong peer review and research though can give very strong motivation as to why a certain algorithm is computationally intractable (making the encryption scheme practically unbreakable).

    Before I could ever trust some new-fangled encryption scheme, I think I would like to see the company submitting REAL detailed articles of mathematics and techniques to appropriate research conferences and have the whole algorithm and math undergo the process of peer review. Its just too easy to fuck up encryption and to think something REALLY REALLY hard to compute isn't in reality a lot easier than it seems.

  • Key size, addendum (Score:5, Informative)

    by Xner ( 96363 ) on Tuesday February 11, 2003 @07:52AM (#5278426) Homepage
    If any of you are wondering why asymmetrical cryptography requires larger keys than symmetrical cryptography, well, the answer is exceedingly simple.

    Symmetrical cryptography does not depend on any specific properties of the numbers selected as the key of the cryptosystem. Therefore a 128 bit key can assume 2^128 different values and, as some other poster pointed out, there is not enough energy in the universe to overcome the background radiation as many times as it would take to count to 2^128, let alone try and brute force the cypher.

    Asymmetric cryptography on the other hand derives its features from mathematical properties of some of the numbers used. For example, some systems require the a product of large prime numbers, or discrete logarithms etc. This means that, for example in RSA, you cannot use all of the 2^128 values of a 128 bit key.

    Most systems in use today are so-called hybrid systems, using both asymmetric and symmetric cryptography. Since a cryptosystem is as strong as its weakest link, you need to increase the asymmetric keysize to be at least as difficult to break as the symmetric part. Given the current knowledge of factoring algorithms and the like, you need at least a1024 to 2048 bit RSA key to stack up against a 128 bit symmetrical key.

  • Re:Sounds good... (Score:2, Informative)

    by kyhwana ( 18093 ) <kyhwana@SELL-YOUR-SOUL.kyhwana.org> on Tuesday February 11, 2003 @08:05AM (#5278464) Homepage
    This is called Rubber Hosing, or one of several other attacks ;)
    Just torture/blackmail the people with the keys.
  • Re:Oh Good... (Score:3, Informative)

    by beef3k ( 551086 ) on Tuesday February 11, 2003 @08:16AM (#5278489)
    Relevant parts for the lazy:

    Warning Sign #1: Pseudo-mathematical gobbledygook.

    Meganet has a beauty on their Web site: "The base of VME is a Virtual Matrix, a matrix of binary values which is infinity in size in theory and therefore have no redundant value. The data to be encrypted is compared to the data in the Virtual Matrix. Once a match is found, a set of pointers that indicate how to navigate inside the Virtual Matrix is created. That set of pointers (which is worthless unless pointing to the right Virtual Matrix) is then further encrypted in dozens other algorithms in different stages to create an avalanche effect. The result is an encrypted file that even if decrypted is completely meaningless since the decrypted data is not the actual data but rather a set of pointers. Considering that each session of VME has a unique different Virtual Matrix and that the data pattern within the Virtual Matrix is completely random and non-redundant, there is no way to derive the data out of the pointer set." This makes no sense, even to an expert.

    Warning Sign #5: Ridiculous key lengths.

    Meganet takes the ridiculous a step further : "1 million bit symmetric keys -- The market offer's [sic] 40-160 bit only!!"

    Longer key lengths are better, but only up to a point. AES will have 128-bit, 192-bit, and 256-bit key lengths. This is far longer than needed for the foreseeable future. In fact, we cannot even imagine a world where 256-bit brute force searches are possible. It requires some fundamental breakthroughs in physics and our understanding of the universe. For public-key cryptography, 2048-bit keys have same sort of property; longer is meaningless.

    Warning Sign #8: Security proofs.

    There are two kinds of snake-oil proofs. The first are real mathematical proofs that don't say anything about real security. The second are fake proofs. Meganet claims to have a proof that their VME algorithm is as secure as a one-time pad. Their "proof" is to explain how a one-time pad works, add the magic spell "VME has the same phenomenon behavior patterns, hence proves to be equally strong and unbreakable as OTP," and then give the results of some statistical tests. This is not a proof. It isn't even close.
  • by johntromp ( 565732 ) on Tuesday February 11, 2003 @08:43AM (#5278592)
    Check out http://web.archive.org/web/*/http://www.meganet.co m [archive.org] for a great source of amusement.

    Curiously, all of their challenges are over before ever appearing on their website...

  • by gweihir ( 88907 ) on Tuesday February 11, 2003 @08:53AM (#5278640)
    Geiger counter is bad. It has a fixed time after a pulse where it will not detect a second pulse.

    As a consequence you cannot get high rates and there is some structure in the output. What is wrong with using a 50 cent Zener Diode? Or a 1 Euro fast noisy OpAMP with amplification 100 and grounded input? Both produce high quality random noise, first case electrons jumping the PN-wall, second case electrons moving around (termal noise).
  • by Apuleius ( 6901 ) on Tuesday February 11, 2003 @09:03AM (#5278687) Journal
    (Typing from a wierd 'puter, so I can't
    cut and paste the links.) Google for
    'meganet', 'encryption', and 'doghouse'
    and you'll find two Doghouse entries for these
    guys on Cryptogram. One makes fun of their
    product; the other for them changing their
    name in response to the first entry.
  • by dave_f1m ( 602921 ) on Tuesday February 11, 2003 @11:01AM (#5279456)
    You're confusing random numbers with pseudo-random numbers. Random numbers can be created by, say, a radioactive source. Yes, there are equations involved, but trying to reproduce the stream won't work because it is random.

    - dave f.
  • by j3110 ( 193209 ) <samterrell&gmail,com> on Tuesday February 11, 2003 @02:50PM (#5281660) Homepage
    the problem was, I couldn't decrypt it either...

    It turns out if you have a key, you can just guess at it, and eventually break it... I just went to the source of the problem... the key. If you don't have a key, you can't break it. Unfortunately, as it turns out, you can't decrypt it either.

    Seriously thhough:
    It probably is theoretically possible despite what you may see on here to make an unbreakable encryption. The only problem with this is that it can only be used on data less than the key size(AKA one time pad) and random data(AKA data of an unknown format). If you can accomplish either these two, I don't think anyone will be able to break it. The problem is: With a one time pad, it's pretty much the same as carrying the data to the other end; data is useless unless someone can understand it.

    I've always wanted to start a cryto challenge of a crypto that had no signature and was of nearly random data. The problem is, computers are not that great at pattern matching, and won't be able to find a good pattern in your data format to begin with. This is compounded with no verification that the key you used is valid. In theory, you could get anything out of the decryption if it weren't for that pesky external signature. Remove those, and it could decrypt to just about anything the same length.

    In a nutshell, if you had the perfect compression (theoretically impossible) it would be impossible to break your encryption (if you didn't have a signature or hash for verification). Now if only compression was encryption oriented (no predictable bits... thus not perfect), we would be all set. If you researched enough, you may be able to make it very hard to predict bits in compression.

    Most encryption in the past has been broken by the redundancy of the data (Signatures, statistics, etc.) so that you know if you have the right key (the signature matches, the MD5 matches, or it looks like the target language). If it's impossible to know if you have decrypted the message, it's impossible to break.
  • Re:Nope (Score:3, Informative)

    by el_chicano ( 36361 ) on Tuesday February 11, 2003 @03:25PM (#5282025) Homepage Journal
    For the Germans, it was called Navajo.
    Actually the Navajo code talkers were used in the Pacific theater against the Japanese [navy.mil]

No man is an island if he's on at least one mailing list.

Working...