<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: How the NSA cheated cryptography	</title>
	<atom:link href="/2013/09/23/how-the-nsa-cheated-cryptography/feed/" rel="self" type="application/rss+xml" />
	<link>/2013/09/23/how-the-nsa-cheated-cryptography/</link>
	<description>Lapsed Ordinary</description>
	<lastBuildDate>Thu, 11 Sep 2014 21:35:28 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>
		By: A talk on Dual_EC_DRBG &#124; Lapsed Ordinary		</title>
		<link>/2013/09/23/how-the-nsa-cheated-cryptography/#comment-8</link>

		<dc:creator><![CDATA[A talk on Dual_EC_DRBG &#124; Lapsed Ordinary]]></dc:creator>
		<pubDate>Thu, 11 Sep 2014 21:35:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=20#comment-8</guid>

					<description><![CDATA[[&#8230;] random number generator, which we are now all but certain was backdoored by the NSA. I wrote a blog about this last [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] random number generator, which we are now all but certain was backdoored by the NSA. I wrote a blog about this last [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Come la NSA ha truccato la crittografia &#124; L&#039; essenziale e&#039; invisibile agli occhi		</title>
		<link>/2013/09/23/how-the-nsa-cheated-cryptography/#comment-7</link>

		<dc:creator><![CDATA[Come la NSA ha truccato la crittografia &#124; L&#039; essenziale e&#039; invisibile agli occhi]]></dc:creator>
		<pubDate>Sun, 03 Nov 2013 12:36:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=20#comment-7</guid>

					<description><![CDATA[[&#8230;] Il post in inglese sul blog di Martin: How the NSA cheated cryptography [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Il post in inglese sul blog di Martin: How the NSA cheated cryptography [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: How the NSA cheated cryptography &#124; Lapsed Ordin...		</title>
		<link>/2013/09/23/how-the-nsa-cheated-cryptography/#comment-6</link>

		<dc:creator><![CDATA[How the NSA cheated cryptography &#124; Lapsed Ordin...]]></dc:creator>
		<pubDate>Wed, 02 Oct 2013 05:24:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=20#comment-6</guid>

					<description><![CDATA[[&#8230;] How the NSA cheated cryptography: http://t.co/QO7xxvDGuR Great explanation of the suspected NSA backdoor in Dual_EC_DRBG by @martijn_grooten&#160; [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] How the NSA cheated cryptography: <a href="http://t.co/QO7xxvDGuR" rel="nofollow ugc">http://t.co/QO7xxvDGuR</a> Great explanation of the suspected NSA backdoor in Dual_EC_DRBG by @martijn_grooten&nbsp; [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Levi		</title>
		<link>/2013/09/23/how-the-nsa-cheated-cryptography/#comment-5</link>

		<dc:creator><![CDATA[Levi]]></dc:creator>
		<pubDate>Fri, 27 Sep 2013 00:13:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=20#comment-5</guid>

					<description><![CDATA[Martijn is on the right track. There&#039;s nothing worse than realizing the foundation holding up our fascinating future-world of modern technology is cracked. NIST hasn&#039;t the foggiest what it will do when mathematics-based computation is abandoned as the  backbone of cryptography. This day is coming very, very soon. Several gapping holes exist in even the most recent standards published by this organization. Logic Lock Encryption fundamentally transforms the computational aspect of securing data &#038; irreversibly obscures the process...using the principles of physics &#038; quantum entanglement. I say, &quot;Buckle up and get ready for the show.&quot;]]></description>
			<content:encoded><![CDATA[<p>Martijn is on the right track. There&#8217;s nothing worse than realizing the foundation holding up our fascinating future-world of modern technology is cracked. NIST hasn&#8217;t the foggiest what it will do when mathematics-based computation is abandoned as the  backbone of cryptography. This day is coming very, very soon. Several gapping holes exist in even the most recent standards published by this organization. Logic Lock Encryption fundamentally transforms the computational aspect of securing data &amp; irreversibly obscures the process&#8230;using the principles of physics &amp; quantum entanglement. I say, &#8220;Buckle up and get ready for the show.&#8221;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: admin		</title>
		<link>/2013/09/23/how-the-nsa-cheated-cryptography/#comment-4</link>

		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 26 Sep 2013 12:32:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=20#comment-4</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;/2013/09/23/how-the-nsa-cheated-cryptography/#comment-3&quot;&gt;Chris Ho-Stuart&lt;/a&gt;.

That&#039;s a good point, though of course it holds for most private-key cryptography. Of cours, in this case the key e would be even more valuable because it&#039;s one key to rule them all.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="/2013/09/23/how-the-nsa-cheated-cryptography/#comment-3">Chris Ho-Stuart</a>.</p>
<p>That&#8217;s a good point, though of course it holds for most private-key cryptography. Of cours, in this case the key e would be even more valuable because it&#8217;s one key to rule them all.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Chris Ho-Stuart		</title>
		<link>/2013/09/23/how-the-nsa-cheated-cryptography/#comment-3</link>

		<dc:creator><![CDATA[Chris Ho-Stuart]]></dc:creator>
		<pubDate>Wed, 25 Sep 2013 23:35:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=20#comment-3</guid>

					<description><![CDATA[There&#039;s another issue here it seems to me.
If you are correct, then the knowledge of e is out there. Someone, somewhere has it written down, and encoded into software.
The security of FIPS 140-certified crypto thus seems to depend crucially on a third party over which you have no control. Another whistle blower, or someone with money troubles who would sell this *very* valuable number, can compromise your crypto. That&#039;s bad. It means, as far as I am concerned, that FIPS 140 should be taken as a sign of unsafe crypto. There&#039;s a credible possibility that anyone (not just the NSA) might be able to break it.]]></description>
			<content:encoded><![CDATA[<p>There&#8217;s another issue here it seems to me.<br />
If you are correct, then the knowledge of e is out there. Someone, somewhere has it written down, and encoded into software.<br />
The security of FIPS 140-certified crypto thus seems to depend crucially on a third party over which you have no control. Another whistle blower, or someone with money troubles who would sell this *very* valuable number, can compromise your crypto. That&#8217;s bad. It means, as far as I am concerned, that FIPS 140 should be taken as a sign of unsafe crypto. There&#8217;s a credible possibility that anyone (not just the NSA) might be able to break it.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: How the NSA cheated cryptography &#187; Murray J. Brown		</title>
		<link>/2013/09/23/how-the-nsa-cheated-cryptography/#comment-2</link>

		<dc:creator><![CDATA[How the NSA cheated cryptography &#187; Murray J. Brown]]></dc:creator>
		<pubDate>Wed, 25 Sep 2013 23:13:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.lapsedordinary.net/?p=20#comment-2</guid>

					<description><![CDATA[[&#8230;] http://www.lapsedordinary.net/2013/09/23/how-the-nsa-cheated-cryptography/ [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] <a href="http://www.lapsedordinary.net/2013/09/23/how-the-nsa-cheated-cryptography/" rel="nofollow ugc">http://www.lapsedordinary.net/2013/09/23/how-the-nsa-cheated-cryptography/</a> [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
