1,000,000 Bit Encryption?
Page 1 of 3 123 LastLast
Results 1 to 10 of 22

Thread: 1,000,000 Bit Encryption?

  1. #1
    Purveyor of Lather Syini666's Avatar
    Join Date
    Aug 2001

    1,000,000 Bit Encryption?

    Full Article [ here ]
    Meganet, an Israeli-U.S. data security company, has developed an encryption technology that appears to be unbreakable, enabling governments and corporations, to keep their data safely out of the hands of competitors, thieves and saboteurs.

    Among the clients that believe in their ability to protect sensitive information is the U.S. government

    Data security is one of the key concerns for governments and corporate users today as hacking becomes increasingly prevalent. In 2000, an FBI survey showed that 90 percent of participating companies had their computer systems vandalized by rivals, hackers, or even disgruntled employees. In January 2000, hackers stole 250,000 credit card numbers from an online CD store. They tried to blackmail the store. When it refused to pay, the hackers published 10,000 card numbers on the Internet.

    Meganet Corporation's founder, Saul Backal, claims that its solution can put an end to these problems. Meganet offers a patented non-linear data mapping technology, called VME (Virtual Matrix Encryption), that creates exceptionally random cipher text and combines it with a one million-bit key, which is unheard of in today's data security markets. Competing solutions offer a maximum of 256 bits.
    I don't know all that much about encyption, but is a 1 million bit key even feasable to use because of its size? We all know how long encryptions and systems that are claimed to be unbreakable last, but I wonder, would it even be possible to break this one due to its size?
    You're not your post count, You're not your avatar or sig, You're not how fast your internet connection is, You are not your processor, hard drive, or graphics card. You're the all-singing, all-dancing crap of AO
    09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

  2. #2
    Antionline Herpetologist
    Join Date
    Aug 2001
    Even a 256 bit encryption requires a hell of a lot of a lot of (usually distributed) processing power to break in any decent amount of time. Even then, it's usually months or even years before it's broken. So for a 1 million bit encryption to be broken, you'd probably need a million computers working for a thousand years or something. However, how much overhead do you think the method is going to put on the system that stores the data. I mean the key itself will be huge. I'm not too coherrent now, too sleepy. Hope I haven't said anything dumb.....
    Buy the Snakes of India book, support research and education (sorry the website has been discontinued)
    My blog: http://biology000.blogspot.com

  3. #3
    Join Date
    Feb 2003
    a secure 512-bit key requires 2^512 computations which is greater than the number of atoms in the universe (10^80 give or take a few orders of magnitude). 2^million is for all practical purposes = infinity. current secure keylengths for AES, the new government standard are 128, 192 and 256. this claim by Meganet is basically preposterous and peppered with phony tech-talk. i wouldn't put too much stock in it. check out this link for a discussion on the subject in 1998:


    here's a link to an informative article on keylengths:


    also, if you really want to learn some cryptography, read Applied Cryptography by Schneier. some people refer to it as the red book.


  4. #4
    Priapistic Monk KorpDeath's Avatar
    Join Date
    Dec 2001
    Sure it's feasible. So now your grocery list will be that much more secure from prying eyes.
    Mankind have a great aversion to intellectual labor; but even supposing knowledge to be easily attainable, more people would be content to be ignorant than would take even a little trouble to acquire it.
    - Samuel Johnson

  5. #5
    Now, RFC Compliant! Noia's Avatar
    Join Date
    Jan 2002
    I think this uses the same principal I mentioned in my tut, Matrix encryptin...basicaly it's like having 256 256-keys....then you swap betwenn them, giving you 3D encryption in a sense.
    It's possible for the simple reason that it isn't one file...it's many, how ever...cracking it is impossible, because you have to crack it based on the belief that it is one HUGE file.

    - Noia
    With all the subtlety of an artillery barrage / Follow blindly, for the true path is sketchy at best. .:Bring OS X to x86!:.
    Og ingen kan minnast dei linne drag i dronningas andlet den fagre dag Då landet her kvilte i heilag fred og alle hadde kjærleik å elske med.

  6. #6
    Join Date
    Jan 2003
    sorry noia if this is a stupid question but how impossible is impossible?

    because as i understand nothing is impossible.

  7. #7
    Senior Member
    Join Date
    Oct 2001
    If the encryption technology supposedly isn't breakable, there is probably something else that is... The OS would have to be configured to not save unencrypted data to the HDD, in ways such as disabling hibernation support, etc. If you decrypt a Word file encrypted with this program, and open it with MS Word, your file is as good as done (temp files, backup saves, etc). Since they appear have a suit of programs, they have probably taken some precautions in their programs to prevent things such as that.

    When your company isn't noticed, and you know you have some good stuff, you are going to work on it to the best of your abilities, aren't you? And since they had only 9 employies, they probably had a good understanding of their code. But, as mentioned earlier, some things are not under their direct control.

    It is up to the Administrators to ensure that the software is implemented correctly. There is a whole lot of stuff to think about here when deciding if you are able to somehow find out what files are on these computers. I'm sure you could find out, even if the encryption was uncrackable...but...do you plan on breaking into the CIA offices and going to the computers in the office down the hall to get the HDD to start searching for these files yourself? Because if you try to do it via the Internet, I'm sure that the person would wonder why their HDD is whirling and the computer is lagging heavily when they get to work in the morning while you are remotely controling their computer from the comfort of your own home...

    So, I'm fairly confident that they have developed this encryption and that it works, but I don't think that you'd have to search through 2^1024 different combinations to find a key. To be non-linear, that would mean (in my opinion) that the file is not sequential, IE it is in some order defined by the key. It is possible that the file size changes, but that would be very complex, as you would have a property of the file that existed before (and you might have used it), that changed in the end - File Size. So, if that was used, it would have to be stored somewhere, and the key would tell you where to find it. I'm just theorizing here (with my somewhat limited crypto knowledge), so I am probably wrong, but I may have hit a good point - what exactly is used in this encryption process. They key alone (probably), or some property of the file? If it is the key alone, then it *could* be possible that using the same key over again would compromise the encrypted data, since the key would have to define the order of the file... So, the huge key size would be there to allow enough keys for anyone to use a nearly infinite number of times, each with different keys... And one more thing, is this private or public key encryption?


  8. #8
    Now, RFC Compliant! Noia's Avatar
    Join Date
    Jan 2002
    Granted.....Nothing is Impossible, wot I meant was...by the time you'v cracked it....the data would be useless, you'd be dead and the technology to read it would be long gone

    Maby Impossible is too strong a word...but it's damn near it...

    - Noia
    With all the subtlety of an artillery barrage / Follow blindly, for the true path is sketchy at best. .:Bring OS X to x86!:.
    Og ingen kan minnast dei linne drag i dronningas andlet den fagre dag Då landet her kvilte i heilag fred og alle hadde kjærleik å elske med.

  9. #9
    Join Date
    Feb 2002
    Wow that's a big number lol.

    I'm not very big in the encryption world, not 100% sure how the entire thing works but I have a very primitive idea. There was a challenge put forth by a math teacher at my last school that told us if we could give him a print out of 1,000,000 Xs then he'd give us an A in the class. Needless to say people tried it. I went home and tried to write a program to do it. The program worked but what I quickly realized that with the computer equipment that I have/had it was not feesible. He liked my method so he bought me a free pizza.

    How does this relate to encryption? Well as it was said before, you'd be long dead before you could crack that code (that is at this stage in the game).

    Ahh class is starting!
    To be God is to be Root, if someone is erking you just type: rm -d /home/heathen

  10. #10
    Leftie Linux Lover the_JinX's Avatar
    Join Date
    Nov 2001
    Beverwijk Netherlands
    I don't think those 1Mbit keys are realy practical..
    It's like packing your laptop in a cement block..
    Using a 16 wheel truck to transport a mouse..

    And I'm with Tim_axe on this one..
    The security is only as strong as the weakest link.. yeah that'd be you

    /me stay's with the 1024kbits ;}
    ASCII stupid question, get a stupid ANSI.
    When in Russia, pet a PETSCII.

    Get your ass over to SLAYRadio the best station for C64 Remixes !

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts