DocV wrote: Sun Nov 17, 2019 9:07 pm
...
Start here...
How the NSA can break trillions of encrypted Web and VPN connections:
https://arstechnica.com/information-tec ... nnections/
that was written in 2015.
Given the purpose of the DPS endpoint, or end points, is known, there would be no need to decrpypt encapsulated layer 4.
I read the article and like most of the (known) NSA attacks on commonly used web/vpn protocols it depends on flaws in key generation and obsolete (Clinton era) cracks of purposely crippled (export controlled) PKE schemes. Undoubtedly there are many unknown flaws they are able to take advantage. But read closely and you'll find that most if not all of the "trillions of web sites" and "many" vpn connections that they can break rely on some (previously) undiscovered flaw in the encryption protocol and/or are still extremely computationally and financially expensive. Especially for building a flawed database of LTC to gun geolocated database. The timely location and tracking of VPN to device to DPS website geodata still suffers from the extremely difficult challenges that I noted (you're monitoring web traffic worldwide (Tier 1/2) in real time to catch the specific request to DPS web site and tie it to the end user IP geolocated in real time. Then you (NSA) hope that DPS is using a flawed and obsolete key certificate of <512 bits that they have already cracked for (on the order of) $100 million, so they can open up the packets to catch the LTC number. So maybe it works for FFL's where they know the end point, but again, like NICS checks, you just get a person (LTC #) and time...with no tie to the gun, until you pull the 4473. Which begs the question, why don't you (NSA) just (illegally) do that and build away at your database, which you can't use (legally) for prosecution anyway.
The interesting thing about modern PKI encryption schemes is they are very well tested in the public domain and there are non-government actors of some talent trying to find flaws and publish them (as could conceivably lead to a Nobel prize). With respect to Diffe-Hellman which was the first published description of the mathematics of a PKI implementation...
(side note, I spent some time around 2008 talking with Prof. Marty Hellman about another tech related issue, though I have read his PKI work and spoke briefly about that too)..
...Hellman has said that after he published his paper with Diffe, that GCHQ (England's NSA) came out and said..."we already invented that, but classified it a State secret"... to which most people said, "yeah sure...too bad, they published first".
Anyway, my point being, the cracking of PKI schemes, absent a flaw in the key generation is still (as far as publicly known) virtually impossible. And don't forget, the Public/Private keypairs are only used to exchange the (ephemeral, for that SSL session only) shared, symmetric cipher keys, so successfully decrypting data in real time depends on a confluence of unlikely factors. On the other hand, the NSA supposedly records everything for later decryption of that which they are interested in...but again that limits the applications where this could be useful.
Another interesting thing, the newest key generation schemes I've heard involve Elliptical Curve cryptography, where you have an equation that describes the graph of an ellipse. Apparently solving these complex polynomials for the two points on the ellipse is even harder than factoring large primes. Read up on these and you'll find that the NSA is accused of putting a flawed Elliptical Curve scheme out there, but supposedly got caught by public researchers. That's why some people prefer non-government symmetric ciphers vs. NIST standard AES256 or 3DES. Some non-gov ones are IDEA, BLOWFISH, TWOFISH,...
