Re: [Hackmeeting] [OT] titoli di merda

Borrar esta mensaxe

Responder a esta mensaxe
Autor: bruno
Data:  
Para: hackmeeting
Temas antigos: Re: [Hackmeeting] [OT]Criptazione omomorfica: la privacy del futuro?
Asunto: Re: [Hackmeeting] [OT] titoli di merda
On Fri, 2011-08-19 at 23:45 +0200, m3l0g wrote:
> http://www.computerworld.com/s/article/9219297/AES_proved_vulnerable_by_Microsoft_researchers
>


dall'articolo linkato
"Researchers from Microsoft and Belgian Katholieke Universiteit Leuven
have discovered a way to break the widely used Advanced Encryption
Standard (AES),"

ma poco sotto
"the methodology used by the researchers would take billions of years of
computer time to break the AES algorithm"
aka "nessun problema reale di sicurezza, oggi"

dalla ricerca
http://research.microsoft.com/en-us/projects/cryptanalysis/aesbc.pdf
"As our attacks are of high computational complexity, they do not
threaten the practical use of AES in any way."

"The authors were visiting Microsoft Research Redmond while working on
these results."

tl;dr quindi
A) AES non è stato rotto
B) il ruolo della microsoft, sbandierato nel titolo, va decisamente
ridimensionato

/bruno
-- 
###    PGP    ###
keyserver hkp://pgp.mit.edu:11371 key id 0xDAF5F950
fingerprint 22DB BE38 04DA D3A5 7B7A 896A A3B3 5E1F DAF5 F950
###  CONTACTS  ###
XMPP/jabber bruno@??? (gmail chat/pidgin/adium/empathy/jitsi)
SIP  bruno.anche.no@??? (ekiga/empathy/jitsi/blink/qutecom)