On 8/24/25 7:07 AM, Michael wrote:

>> Is so ridiculous that with your theory ANYONE could obtain any private 
>> key just with a public key because you can write text plain, encrypt it 
>> with and compare both. Please stop doing that kind of affirmations.
> 
> All encryption methods and ciphers are secure, until ... they no longer are.
> 
> 
>> Your theory is only valid for a few old (really old) encryptions 
>> algorythms and usually symmetric.
> 
> Sure, this stands today, but tomorrow new mathematical solutions could be 
> discovered, better computational technologies developed, larger data storage, 
> etc.  No doubt resistant algos and ciphers would be devised in turn to 
> counteract it thereafter, but what's broken is broken.
> 
> If I were a dissident under totalitarian rule and my family's life depended 
> on 
> it, I would consciously choose to be needlessly paranoid rather than take a 
> chance.  Living in a free society and for communicating casually with 
> friends, 
> I'd trust the math.  YMMV.


If I were a dissident under totalitarian rule and my family's life
depended on it, I would stake my and their life on the belief that new
attacks against cryptography use entirely new attack methodologies and
defending against the attacks originally used to break the Caesar Cipher
is a waste of time.

I'd focus rather more on ensuring messages which I send, use algorithms
known to be secure today, and avoid sending incriminating information
unless it has a "limited shelf life" -- i.e. if the government records
the message and in 20 years gets the ability to decrypt it, it cannot
cause harm anymore. As part of that, don't send more information than is
necessary. If you're leaving email quotes in your replies, that may
include something the other person shouldn't have said but let slip, and
keeping it in *every* message means many more chances for the
totalitarian government to record the message for 20 years in the future
when they break it. That is a **much** better reason to avoid quoting
existing emails than "known quoted content could be used to attack the
algorithm, I heard it was successfully used to attack the Caesar Cipher".

Related: forward secrecy protects against future compromise of the
secret key (but not compromise of the crypto algorithm itself).


-- 
Eli Schwartz

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to