Cryptography as a speed-bump
I've talked to a lot of folks over the years about crypto, and while some of them (usually geeks) "get it," there are a few who still don't understand the significance of using good cryptographic protection to secure your files, and some conspiracy-theorist types who believe it's no good against corrupt governments or tyrants (trying really hard not to make a political statement here) because "the government can break it anyway" or "the government has more powerful computers than we do."
Yes, they can, and yes, they do.
But it's still not enough. What people fail to understand is that encrypting data is far less resource-intensive than brute-forcing decryption of data when you don't know the key. With a known key, encrypting and decrypting are roughly equivalent in how much CPU muscle (and time!) they require. However, a post on Slashdot really clarifies this imbalance that we see in the case of a brute-force attack.
[Begin /. Quote]
----------------------
Just the act of counting from 1 to 2^256 at a rate of 1 trillion keys per second would take approximately 2^191 years (3 x 10^57).
That's 3,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 years.
This is WAY longer than the universe has been in existence and probably longer than it will continue to exist in the future. That's just counting the keys. Actually testing them would probably slow your key rate down significantly.
The math as I see it:
1 trillion keys per second = 2^40
2^40 * 86,400 * 365 = 3.4 x 10^19 keys per year
- or 2^65 keys per year
2^256 keys / 2^65 keys per year = 2^191 years (256 - 65 = 191)
- or 3 x 10^57 years
---------------------------------
[End /. Quote]
The fact of the matter is that any cryptographic protection can and will be broken. HOWEVER, proper use of the technology can make it sufficiently difficult or drawn-out that the data will be irrelevant by the time it is deciphered.
Yes, the government has "powerful computers." They're not so powerful that they can shave 3,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 years down to something practical. No computer system is.
When, in most cases, a mere 3 years would be enough to render the encrypted data useless by way of irrelevance, and certainly long enough to run out the statute of limitations in many jurisdictions, a figure like the one above is obviously overkill in more ways than I care to count (many of which whose mere mention would insult your intelligence).
So, in conclusion, you have plenty to gain in the way of privacy, and nothing to lose (save for a few minutes of your time) by encrypting your data. If you're not comfortable with command-line/*nix/"advanced"/get-your-hands-dirty tools, try something like PGP Desktop that makes it easy.
Yes, they can, and yes, they do.
But it's still not enough. What people fail to understand is that encrypting data is far less resource-intensive than brute-forcing decryption of data when you don't know the key. With a known key, encrypting and decrypting are roughly equivalent in how much CPU muscle (and time!) they require. However, a post on Slashdot really clarifies this imbalance that we see in the case of a brute-force attack.
[Begin /. Quote]
----------------------
Just the act of counting from 1 to 2^256 at a rate of 1 trillion keys per second would take approximately 2^191 years (3 x 10^57).
That's 3,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 years.
This is WAY longer than the universe has been in existence and probably longer than it will continue to exist in the future. That's just counting the keys. Actually testing them would probably slow your key rate down significantly.
The math as I see it:
1 trillion keys per second = 2^40
2^40 * 86,400 * 365 = 3.4 x 10^19 keys per year
- or 2^65 keys per year
2^256 keys / 2^65 keys per year = 2^191 years (256 - 65 = 191)
- or 3 x 10^57 years
---------------------------------
[End /. Quote]
The fact of the matter is that any cryptographic protection can and will be broken. HOWEVER, proper use of the technology can make it sufficiently difficult or drawn-out that the data will be irrelevant by the time it is deciphered.
Yes, the government has "powerful computers." They're not so powerful that they can shave 3,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 years down to something practical. No computer system is.
When, in most cases, a mere 3 years would be enough to render the encrypted data useless by way of irrelevance, and certainly long enough to run out the statute of limitations in many jurisdictions, a figure like the one above is obviously overkill in more ways than I care to count (many of which whose mere mention would insult your intelligence).
So, in conclusion, you have plenty to gain in the way of privacy, and nothing to lose (save for a few minutes of your time) by encrypting your data. If you're not comfortable with command-line/*nix/"advanced"/get-your-hands-dirty tools, try something like PGP Desktop that makes it easy.