TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: What are the realistic capabilities of the NSA?

12 点作者 anemitz将近 12 年前
From a technical perspective, what are the data collection, analysis, and code-breaking capabilities available to the NSA?<p>What implications does this have on widely used security protocols and methodologies?

2 条评论

bifrost将近 12 年前
I think it&#x27;d be better to consider &quot;what can&#x27;t the NSA do&quot; given their budget and capabilities.<p>Tapping and storing terabits of data is effectively trivial, analysis is the hard part. If they hold useful SSL keys (like Facebook, Google, etc) they&#x27;ll have a much a much easier time figuring out what people are doing.
e3pi将近 12 年前
Your own secure crypto:<p>Assume everything popular is attacked, assume vast libraries of primitive and proprietary cryptanalysis routines.<p>Of their thousands of hires with security clearance, the cipher newbies are likely given exercises attacking odds-and-ends with massive (old?) Cray orchards.<p>OTP - is always secure but inadequate for large plaintext. Pad transport is vulnerable.<p>Naive stream ciphers are seductive but weak.<p>Brits, MI5(?) had RSA a decade and a half(?) before RSA.<p>Factorization is RH(`assume Riemann Hypothesis&#x27;), perhaps new unpublished vulnerabilities to probable primes?<p>Better amateur practicing crypto analysts than me can likely offer good points here.<p>Wikipedia has terrific crypto intro. eg:<p><a href="http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Outline_of_cryptography" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Outline_of_cryptography</a><p>and ...<p><a href="http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Deniable_encryption" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Deniable_encryption</a>