Osama using PGP encryption?! WTF?@!

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

ToBeMe

Diamond Member
Jun 21, 2000
5,711
0
0
Another thing (at least for the first two) you guys have also overlooked is........Bin Laden is his LAST name! He actually has a neice & nephew that attend college in Boston and his sister lives in South Carolina!:Q
 

sgopal2

Senior member
Mar 11, 2001
348
0
0
Check out this:

http://www.hushmail.com

"HushMail is the world's premier secure Web-based email system...Thanks to a unique key pair management system, Hushmail eliminates the risk of leaving unencrypted files on Webservers...These algorithms, combined with HushMail's unique OpenPGP key management system, offer users unrivaled levels of security."

Looks like these Taliban turds are using PGP to encrypt their messages then sending them using Hushmail....a double encryption. These fvckers are starting to piss me off more and more.

Did anyone find anymore info on the second email listed??
 

piku

Diamond Member
May 30, 2000
4,049
1
0


<< There is also something called PGPFone that lets people communicate securely using phone lines...this would render phone taps useless. >>


Government regulation would make that illegal, I believe. Thats why analog modems are capped at 56k I think - anything higher and they cant trace it.

Now I'm sure you can do something like that over the internet encrypted, but using normal phone lines I don't think they would allow it. I could be completley wrong here though...
 

zippy

Diamond Member
Nov 10, 1999
9,998
1
0
LOL!

Yeah, I'm sure he's using his name.

He might as well put "Terrorist Psycho" as the name.
 

vegetation

Diamond Member
Feb 21, 2001
4,270
2
0
Don't forget that there are hundreds of bin Ladens in Saudi Arabia, running the bin Laden Group -- a huge billion dollar company with stakes in construction, telecom, manufacturing, and chemicals, among other things.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
The fact Bin Laden uses encryption combines with the knee jerk reaction the US gov is known for, it may soon be illegal to keep any information private. As I say here!
 

db

Lifer
Dec 6, 1999
10,575
292
126
of course he uses pgp. why would he use something w/ a backdoor?
this is only common sense.
 

Justarius

Member
Jul 25, 2001
35
0
0


<< PGP uses (i should say used to the last time i checked) IDEA for encryption, RSA for key management and MD5 for hashing.

RSA math:
find two random large prime numbers p and q.

compute n = pq

find encryption key e, such that e and (p-1)(q-1) are relatively prime.

using the extended euclidean algorithm, compute the decryption key d, such that e and d are inverses of each other modulo (p-1)(q-1).

if message m is to be encrypted, then the encrypted message
c = (m ^ e) mod n

to decrypt the message,
m = (c ^ d) mod n

e and d are, in a manner of speaking, opposites of each other. what e can do, d can undo and vice versa. the decryption key d is kept private. the encryption key e is made available to the public. given d and n, if one was to figure out p and q, the algorithm would be considered broken. all these numbers are large - 1024 bits and more. factoring such large numbers is very slow by the standards of computing hardware available to the masses.

if i remember PGP correctly, the sender generates a symmetric key for the IDEA algorithm and uses it to encrypt the message. the sender then encrypts the IDEA key with the receiver's public key. optionally, the sender generates a hash of the entire message using MD5 and encrypts it with his private key. this last step is called signing. the receiver verifys the signature first, if it is present. he uses the sender's public key to decrypt the hash. then he independently generates a hash of the entire message and compares the two. if they match, he knows that the message actually came from the sender and not just anyone. then the receiver uses his private key to decrypt the IDEA key. the IDEA key is then used to decrypt the actual message.

PGP uses both symmetric and asymmetric crypto for performance reasons. asymmetric crypto is slow because of the exponentiation. symmetric crypto usually goes much faster because it uses bit permutation and substitution.
>>



Boolerboy: I understand the RSA idea. However, can you explain to me how the MD5 hash works so that one can identify the signature of the message and how it prevents from being tampered with so that I don't have a problem where I THINK I'm getting a message from someone, but I'm not. I just want to have that clarified since I've always wondered how it works. Thanks.
 

OS

Lifer
Oct 11, 1999
15,581
1
76


<< You can't make encryption illegal, pandora's box was opened 50 years ago when the idea was invented. We must deal with the fact that said encryption exists, not make silly laws that hurt internal industries while accomplishing no ready goal. The availability of said encryption makes credit card and banking transactions safe, it protects our entire economic, millitary and civillian enterprise systems.

Guns don't kill people, people do. Encryption doens't hurt people, people do.
>>



Aha, a voice of reason. The entire US financial system depends on encryption, we buy things on the net using encryption, and you can be DAMN sure that US government agencies also use it for anything remotely important. Encryption is a double bladed sword, and IMO the good has so far infinitely outweighed the bad.
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0


<<

<< You can't make encryption illegal, pandora's box was opened 50 years ago when the idea was invented. We must deal with the fact that said encryption exists, not make silly laws that hurt internal industries while accomplishing no ready goal. The availability of said encryption makes credit card and banking transactions safe, it protects our entire economic, millitary and civillian enterprise systems.

Guns don't kill people, people do. Encryption doens't hurt people, people do.
>>



Aha, a voice of reason. The entire US financial system depends on encryption, we buy things on the net using encryption, and you can be DAMN sure that US government agencies also use it for anything remotely important. Encryption is a double bladed sword, and IMO the good has so far infinitely outweighed the bad.
>>



Amen! And I would go to jail before even CONSIDERING telnetting to my machine...
 

NuclearFusi0n

Diamond Member
Jul 2, 2001
7,028
0
0


<<

<< There is also something called PGPFone that lets people communicate securely using phone lines...this would render phone taps useless. >>


Government regulation would make that illegal, I believe. Thats why analog modems are capped at 56k I think - anything higher and they cant trace it.

>>



anything higher than 53k and the chances of crosstalk (your convo popping into somebody elses) greatly increase

it's not illegal, BTW, it's a fone call through the 'net
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0


<<

<<

<< There is also something called PGPFone that lets people communicate securely using phone lines...this would render phone taps useless. >>


Government regulation would make that illegal, I believe. Thats why analog modems are capped at 56k I think - anything higher and they cant trace it.

>>



anything higher than 53k and the chances of crosstalk (your convo popping into somebody elses) greatly increase

it's not illegal, BTW, it's a fone call through the 'net
>>



Thanks to knee-jerk political movements all un-breakable/un-backdoored forms of encryption coul dbe outlawed.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |