Decryption Challenge. Who is willing to try?

Discussion in 'privacy technology' started by truthseeker, Jul 20, 2008.

Thread Status:
Not open for further replies.
  1. Justin Troutman

    Justin Troutman Cryptography Expert

    Joined:
    Dec 23, 2007
    Posts:
    226
    Location:
    North Carolina, USA / Minas Gerais, BR
    Some thoughts.

    As far as the cryptographic aspects of this are concerned: Gary S.-W. Yeo and Raphael C.-W. Phan present attacks on WinRar, in their 2006 paper, entitled, "On the security of the WinRAR encryption feature." In the abstract, they state, "Our results, compared to recent attacks on WinZip by Kohno, show that WinRAR appears to offer slightly better security features." Tadayoshi Kohno presents attacks on WinZip in his 2004 paper, entitled, "Attacking and repairing the WinZip encryption scheme." Here's a link to the full paper by Tadayoshi Kohno, entitled, "Analysis of the WinZip encryption method."

    In reality, though, as I've admittedly beaten to death and beyond, whenever cryptography fails in practice, it's almost always because of the implementation -- not the cryptography. As such, don't worry about the cryptographic primitive; worry about its implementation. All in all, there are usually easier ways at getting at plaintext, as opposed to going through the cryptography itself; it's usually the strongest link of a system. Furthermore, in cases where cryptography is an afterthought -- such as this one -- the likelihood of a failure being implementation related is all but set in stone.

    For a plethora of reasons, folks tend to deprive cryptography of its due credit, while ignoring the more realistic risk of implementation failure. Bear in mind that experts design cryptography, but non-experts deploy it. Sure, experts can still get it wrong, but a non-expert is more likely to. If confidentiality and integrity are really important to me, I'm going to go with a solution that's built with cryptography in mind, from the get-go. I have little faith in products that tack on cryptographic functionality short of cellophane and shelving.
     
  2. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    What are you talking about? Can you break my password or not?
     
  3. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    Re: Some thoughts.

    Can you please elaborate on and explain to me what you mean exactly when you talk about "implementation failure"?

    I understand the first part you said, the encryption of that Winrar I made is very solid and nobody can break it, for if it was possible, you or the other guys would have mentioned the "secret word" I have in the text file.

    But the second part confuses me a bit. When you talk about "implementation failure" are you reffering to a flaw in the way Winrar would encrypt files? And that flaw or weakness could open the winrar file? If so, did you download my file and see if there is any such implementation weakness?
     
  4. Someone

    Someone Registered Member

    Joined:
    Jan 18, 2008
    Posts:
    1,106
    Hi

    I'm not sure why you seem to be obsessed with getting a Wilder's person to break your password.

    I am not working for an intelligence agency or a malware writer or anything like that. But I'm saying people more knowledgable COULD be able to do it.

    For example, maybe you have an un-encypted copy of that file in a temp folder or something, which would be much easier to get.
     
  5. Someone

    Someone Registered Member

    Joined:
    Jan 18, 2008
    Posts:
    1,106
    Re: Some thoughts.

    Hi

    I think he means WinRAR could have been coded incorrectly so there is a flaw in the implementation. This would make it significantly easier to crack, but probably still very difficult using normal computers (i.e. not supercomputers or something like that).
     
  6. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    If you think someone can break my winrar file, then send it to that person and get them to tell you the "secret word" within the text file.
     
  7. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,278
    Location:
    New England
    As Steve already mentioned, it is extremely unlikely (virtually impossible, actually) for someone to decrypt the file you've uploaded. So, you can rest assured that files you transmit with that level of encryption are probably going to be safe from most prying eyes.

    However, all the other posts in this thread are saying something else. That being, if someone gets access to your PC, there is a chance that there are other ways to get access to your secret data. One example being copies of the files that were stored unencrypted in temporary storage locations on your disk, before you encrypted them. Or, others mention that if there were a keylogger on your system while you were encrypting or decrypting your files, they might get a hold of your passwords or keys.

    These are different areas of concern that have nothing to do with the file you uploaded. They are trying to let you know that there is more to keeping files secure then just running a single progam and thinking you are done.

    Justin, (who Steve referred to as the "resident crypto kid" ;) ), was talking about where cryptography usually fails, that being in how it is implemented by programmers, not because of the cryptography algorythms. That leads to the possibility that there may be ways to break into some encrypted files faster than just brute forcing the password. However, in all likelihood, there isn't a signifcant flaw in the WinRAR encryption that's going to let anyone decrypt the file you uploaded.

    So, no. No one is going to break that file and tell you what word is in it. That however does not mean that every piece of data on your PC is 100% safe if someone gets physical access to your PC, or you somehow get a keylogger. That's what all the other posts are trying to say.
     
  8. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,363
    Location:
    Oz
    If that is a secureity issue, how can it be disabled? Is there a downside to having it disabled?
     
  9. Someone

    Someone Registered Member

    Joined:
    Jan 18, 2008
    Posts:
    1,106
    Hi

    OK. I'll try to make this even clearer. I am not working for an intelligence agency or am a malware writer or someone with supercomputers at my disposal, nor do I personally know of anyone who is. However, many of those people do exist in this world.
     
  10. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    Thank you LowWaterMark. Your comments made a lot of sense. Cheers.
     
  11. SteveTX

    SteveTX Registered Member

    Joined:
    Mar 27, 2007
    Posts:
    1,641
    Location:
    TX
    Here is how the attack works: If your system has windows running and it's in a locked workstation mode, programs are still running in the background, you just can't access them through the keyboard and mouse without entering in the password. This lock is superficial. A USB drive with auto-run can have a program on it that simply kills the screensaver/lockout window. Same with a CD / DVD or Firewire device. Unfortunately, the firewire device can do this even with auto-play disabled. So when not in use, disable service to your firewire port.
     
  12. Taliscicero

    Taliscicero Registered Member

    Joined:
    Feb 7, 2008
    Posts:
    1,439
    Honestly you raise a good issue about Winrar, but you shouldn't be challenging people all the time. this is like the 3' rd time you issued a challenge this month ^^;
     
  13. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    I can easily reveal your encrypted WinRar file but first i would need you to take some time to go thru my patented human mind sifter detector that can record everything your eyes have seen within the past 60 hours while also probing your physical memory synapses. :D
     
  14. Justin Troutman

    Justin Troutman Cryptography Expert

    Joined:
    Dec 23, 2007
    Posts:
    226
    Location:
    North Carolina, USA / Minas Gerais, BR
    All-out struggle.

    LowWaterMark's contribution was spot on. I'm referring to the likelihood of programming mistakes being a stack of magnitudes greater than the likelihood of cryptographic breaks. Even if the programming is impeccable, the cryptography being implemented must match the appropriate threat model; not only that, but it must be composed properly. Sometimes, programmers forget that whenever they encrypt, they need to authenticate too. We encrypt for confidentiality, and we should authenticate for integrity; if we forget the latter, it can often lead to the compromise of the former. That's not all, though. Here's an example.

    Let's say our programmer, Ace, is on top of his game. He hasn't made any programming mistakes. He's aware that he needs both encryption and authentication for the threat model he's working under. However, he must also realize that the order of encryption and authentication makes a huge difference. We'll be generous and assume he knows that Encrypt-then-Authenticate is the most conservative composition (i.e., IND-CCA2 /\ INT-CTXT secure). By going this route, he preserves the confidentiality and integrity of the data, but -- woops -- he forgot about the metadata, which is still sitting in plaintext.

    Our programmer did everything right, but faltered when it came to the subtleties of how the cryptography should have been implemented. These subtle mistakes led to information leakage, as well as complete loss of the security guarantees inherent in the generic Encrypt-then-Authenticate composition. This scenario is taken from the paper I linked to, by Tadayoshi Kohno, where he looks at this very problem within the context of WinZip. What is apparent from his research is that implementing cryptography is an all-out struggle -- especially when non-cryptographers are doing the implementing.

    From general programming flukes to specific cryptographic intricacies, there's no shortage of things to trip you up. Don't worry about the cryptography doing its job; it's going to be hard enough to get all of the implementation details right so it can do its job. Unfortunately, I don't have a copy of Gary S.-W. Yeo and Raphael C.-W. Phan's paper on WinRAR, but, for whatever it's worth, they claim it offers "slightly better security features" over WinZip.
     
  15. bigc73542

    bigc73542 Retired Moderator

    Joined:
    Sep 21, 2003
    Posts:
    23,934
    Location:
    SW. Oklahoma
    Here is the NSA's take on aes-128 They don't seem to think that it is all that secure. Clasified but not top secret docs protected by it..
     
  16. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    Not true at all. This is my first and only challenge ever.

    Can you break it? :)

    Can you tell me the word that is written in the text file?
     
  17. truthseeker

    truthseeker Former Poster

    Joined:
    Jan 26, 2008
    Posts:
    977
    Well, put your money where your mouth is. Simply break my Winrar file that is available for download and tell me the word within the text file.

    You say NSA doesn't think that it is at all that secure. So break my simple Winrar file then. Or ask anyone at all from NSA to break it :)

    I come across people all the time about this topic. They talk and talk and talk about how Winrar and/or AES 128 is not that secure. And then they keep talking and talking and talking, but no action.

    So no more words, only actions.

    Many people make wild claims such as:

    Winrar can be broken

    Winrar is not that secure

    AES 128 is not that strong.

    Etc. etc.

    Yet not one of these people making these claims have been able to break my simple little Winrar file. I wonder why? I rest my case :)

    Full of talk, no action.
     
  18. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,278
    Location:
    New England
    As already explained, no one is saying they can break the encryption in the file you uploaded. Steve and Justin already explained why. All other posts are regarding the basis for the strength of the encryption algorithms as seen and known to the industry experts. Asking people over and over to break your file's contents isn't going to yield anything worthwhile. Thread closed.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.