On Tue, Aug 31, 2010 at 10:45 AM, Vivek Rajagopalan <
[email protected]> wrote:

>
>
> Manokaran K wrote:
>
>> Hi,
>>
>> Am sure no one in this list needs an introduction to the issue thats
>> important to the national security administration in India. Apparently,
>> they
>> want to lay their hands on the encryption keys used by operators so that
>> they can listen in on any conversation on their networks.
>>
>> But, how feasible it is for a savvy end user with enough resources at his
>> disposal (read terrorists, maoists etc) to install a small chip (say, an
>> FPGA) that is capable of encrypting (using 1024 bit keys, which are
>> exchanged via a personal courier) the signals even before it reaches the
>> network? Then, even with the govt having the official encryption keys,
>> they
>> will still end up with a garbled msg they cannot decode in reasonable
>> time!!!
>>
>>
> You dont need any electronics for this. The issue is not about users
> sending encrypted messages, it is about users sending cleartext messages.
>
>
Perhaps my post was not clear!

The issue is about bad guys sending encrypted (encrypted by them using some
electronic device even before the network operator's device gets the
opportunity to encrypt it) messages through a channel to which the govt
'thinks' it has access!

regds,
mano
_______________________________________________
ILUGC Mailing List:
http://www.ae.iitm.ac.in/mailman/listinfo/ilugc

Reply via email to