The NSA Can't Crack the iPhone's Encryption

Discussion in 'Tablets and Smart Phones' started by PhazeDelta1, Aug 19, 2012.

  1. PhazeDelta1

    PhazeDelta1 Guest

    Messages:
    15,607
    Likes Received:
    14
    GPU:
    EVGA 1080 FTW
    Interesting nontheless. :nerd:

    Source


    Another interesting but lengthy article about the security on the iPhone.

    http://www.technologyreview.com/news/428477/the-iphone-has-passed-a-key-security-threshold/
     
  2. sykozis

    sykozis Ancient Guru

    Messages:
    22,492
    Likes Received:
    1,537
    GPU:
    Asus RX6700XT
    According to numerous responses to the article in the second link, jailbreaking the phone defeats the security measures. Of course, also according to the article in the second link, it would take 25 years to "brute force" the PIN lock code.... So, it's not that it's unbreakable.....just going to take a crapload of time.
     
    Last edited: Aug 19, 2012
  3. EspHack

    EspHack Ancient Guru

    Messages:
    2,802
    Likes Received:
    190
    GPU:
    ATI/HD5770/1GB
    im a sure a group of mathematicians can "brute force" it faster with some calcs, if they say it will take several years that gives them a start, thats all numerical digits right? and brute force just start counting from 0 to whatever is the key, so they can calculate where to start if it is going to take "several years" maybe instead of 0 they choose the brute force attack to start at 200,000
     
  4. sykozis

    sykozis Ancient Guru

    Messages:
    22,492
    Likes Received:
    1,537
    GPU:
    Asus RX6700XT
    That 25 years is based on a 10-char PIN lock code being used. Can be done within hours with 4 or 6 char PIN lock codes.....of course, that's according to the article from hyperlink 2. Apparently there has to be some delay between attempts, else the phone wipes itself.
     

  5. PhazeDelta1

    PhazeDelta1 Guest

    Messages:
    15,607
    Likes Received:
    14
    GPU:
    EVGA 1080 FTW
    That's a risk associated with jailbreaking. Even so, I would assume that Apple has some sort of remote wiping app for their products. It not unheard of that top secret stuff goes missing every now and then. :nerd:
     
  6. sykozis

    sykozis Ancient Guru

    Messages:
    22,492
    Likes Received:
    1,537
    GPU:
    Asus RX6700XT
    According to the second article, yes, the phone can be wiped remotely.
     
  7. dcx_badass

    dcx_badass Guest

    Messages:
    9,965
    Likes Received:
    1
    GPU:
    Palit GTX 1060 6GB
  8. PhazeDelta1

    PhazeDelta1 Guest

    Messages:
    15,607
    Likes Received:
    14
    GPU:
    EVGA 1080 FTW
  9. sykozis

    sykozis Ancient Guru

    Messages:
    22,492
    Likes Received:
    1,537
    GPU:
    Asus RX6700XT
  10. deltatux

    deltatux Guest

    Messages:
    19,040
    Likes Received:
    15
    GPU:
    GIGABYTE Radeon R9 280
    I call bull****, many in the computer security realm already knows that AES-256 is breakable, I'm rather confident the NSA has enough computational power and intelligent computer scientists finding ways to break AES-256. AES-256 has been broken before by researchers, it can definitely be broken.

    AES isn't indestructible, it's just very hard for anyone to break. Right now the only real thing that's stopping people from breaking AES 256 is the fact that it's very complicated and unless you're a researcher or really adament into gaining whatever secret that was encrypted with AES-256, you'd probably not even bother.

    Wikipedia has a short of known AES-256 attacks: http://en.wikipedia.org/wiki/AES-256#Security

    There are many other articles on the Internet that talks about attacks on AES-256.

    Remember: Digital security mechanisms are not about stopping people from accessing your information. It is about stopping people long enough before they break through or until you can replace it with an even stronger mechanism.

    deltatux
     
    Last edited: Aug 20, 2012

  11. proliferazor

    proliferazor Master Guru

    Messages:
    684
    Likes Received:
    1
    GPU:
    AMD 7950
    If you guys want this on your pc use TrueCrypt its open source super easy to use and you can use 256 EAS or many other types of encryption on your system, you can set up files to encrypt, HD's, or even the HD that holds your operating system keeping it safe too. It also has the benifit of not getting in your way at all, put in a password and bam you have access, no decrypting that's so 90s.

    Finally a truely safe place for all your midget tranny pron.

    If fact there was a story a while back about some drug dealer that had a system protected by truecrypt and 256eas they've had that drive for 10+ years and still are not any closer to reading the information on it. The only way to crack this **** is to get the pass phrase. Either going through every detail of this guys life and putting in related words, using a dictionary, or social engineering ( make the ****er tell you, which they can't). Brute forcing this would take far longer than a lifetime with the strongest computers in the word.

    -------------------------------------------------------------------
    AES permits the use of 256-bit keys. Breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key. A device that could check a billion billion (1018) AES keys per second (if such a device could ever be made - as of 2012, supercomputers have computing capacities of 20 Peta-FLOPS, see Titan. So 50 supercomputers would be required to process (1018) operations per second) would in theory require about 3×10 power of 51 years to exhaust the 256-bit key space.
    from http://en.wikipedia.org/wiki/Brute-force_attack
    --------------------------------------------------------------------
    In other words to even make a scratch in guessing the full amount of possibilities with 50 of the worlds fastest super computers it would take you 10 with 51 more 0's behind it, times 3. IN YEARS o_O
     
    Last edited: Aug 20, 2012
  12. deltatux

    deltatux Guest

    Messages:
    19,040
    Likes Received:
    15
    GPU:
    GIGABYTE Radeon R9 280
    Most people will try a brute force attack, but any high level cryptographer would try to attack it by performing cryptanalysis on the cipher to find weaknesses in the cryptographic system. Attacking such a high performing cryptography system with just brute-force is stupid.

    deltatux
     
  13. d_mouse

    d_mouse Maha Guru

    Messages:
    1,098
    Likes Received:
    9
    GPU:
    Nitro+ 7900XTX
  14. Norvekh

    Norvekh Guest

    Messages:
    2,677
    Likes Received:
    12
    GPU:
    EVGA RTX 2080 Ti
    Any code can be cracked given enough time and resources. Well, aside from the Voynich manuscript but that could be a case that it's simply not even a code but just gibberish. Point being, eventually every encryption technique can be cracked, it's just a question of the value of doing so versus the time needed to do it. (Another reason for not cracking that manuscript. It's not worth much more than bragging rights.) Cracking computer encryption that is used by governments and corporations for sensitive data? Count on it. Cracking the cell phone of a 13 year old girl with a penchant for text messaging? Unlikely.
     

Share This Page