On Mar 3, 2009, at 6:04 PM, Atom Smasher wrote:

On Tue, 3 Mar 2009, David Shaw wrote:

This article caught my eye. One of the things that I gleaned from the article is that it's obvious that law enforcement (at this level) does not have the ability to brute-force crack PGP encrypted data. Instead, the courts are attempting to force the surrender of the passphrase.

Well, maybe. It's also possible that law enforcement does have the ability to get into the encrypted data (by some means - I doubt brute force), but does not want the knowledge of that ability to be made public.
===================

i would think the FBI (presuming that they're involved) would be able to brute-force a pass-phrase in less than a year. they have the disk, so in all likelihood the weakest link in the chain is the pass- phrase (and that's assuming that there's no cache/tmp files that are not encrypted).

Good point. I was thinking about the session key, which is basically brute forcing proof. The passphrase would indeed be an easier attack.

The lawyer discussion I posted (http://volokh.com/posts/chain_1197670606.shtml ) suggests that law enforcement did try to "guess" (his word) the passphrase. Guessing could be anything from trying two or three passphrases before giving up to running a list of common passphrases against it. For all we know, they're still running the passphrase guesser right now.

David


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to