Question:
Is 128 bit SSL encryption still secure or has someone found a way to break it?
runner1
2008-01-01 04:51:05 UTC
Is 128 bit SSL encryption still secure or has someone found a way to break it?
Seven answers:
Yawn Gnome
2008-01-01 05:10:10 UTC
128 SSL, or 128 bit Secure Socket Layer Protocol is as secure as the last backup that was made of it. Once it goes live, or on the internet it is no longer secure, or as secure.

For every three that are working on secure algorithms , there are two that are cracking it.

SSL by itself gives you nothing - just a handshake and encryption. You need an application to drive SSL to get real work done.

Source:

http://www.rpatrick.com/tech/ssh-ssl/

SSH (Secure Shell) and SSL (Secure Sockets Layer) can both be used to secure communications across the Internet. This page tries to explain the differences between the two in easily understood terms.



SSL was designed to secure web sessions; it can do more, but that's the original intent.



SSH was designed to replace telnet and FTP; it can do more, but that's the original intent.



SSL is a drop-in with a number of uses. It front-ends HTTP to give you HTTPS. It can also do this for POP3, SMTP, IMAP, and just about any other well-behaved TCP application. It's real easy for most programmers who are creating network applications from scratch to just grab an SSL implementation and bundle it with their app to provide encryption when communicating across the network via TCP. Check out: stunnel.org.



SSH is a swiss-army-knife designed to do a lot of different things, most of which revolve around setting up a secure tunnel between hosts. Some implementations of SSH rely on SSL libraries - this is because SSH and SSL use many of the same encryption algorithms (i.e. TripleDES).



SSH is not based on SSL in the sense that HTTPS is based on SSL. SSH does much more than SSL, and they don't talk to each other - the two are different protocols, but have some overlap in how they accomplish similiar goals.



SSL by itself gives you nothing - just a handshake and encryption. You need an application to drive SSL to get real work done.



SSH by itself does a whole lot of useful stuff that allows users to perform real work. Two aspects of SSH are the console login (telnet replacement) and secure file transfers (ftp replacement), but you also get an ability to tunnel (secure) additional applications, enabling a user to run HTTP, FTP, POP3, and just about anything else THROUGH an SSH tunnel.



Without interesting traffic from an application, SSL does nothing. Without interesting traffic from an application, SSH brings up an encrypted tunnel between two hosts which allows you to get real work done through an interactive login shell, file transfers, etc.



Last comment: HTTPS does not extend SSL, it uses SSL to do HTTP securely. SSH does much more than SSL, and you can tunnel HTTPS through it! Just because both SSL and SSH can do TripleDES doesn't mean one is based on the other.



Links for more information:

Snailbook, SSH and SSL differences

OpenSSL.org

OpenSSH.org

And that link leads to:

http://www.snailbook.com/faq/ssl.auto.html

man-in-the-middle attack -- an attack on a protocol in which Attila the attacker controls the communications channel between legitimate speakers Ted and Alice, and can delete or insert messages at will. Attila intercepts all protocol messages, masquerading as Ted to Alice, and as Alice to Ted. Ted and Alice each believe they are negotiating encryption keys with the other, but in fact they are both negotiating them with Attila instead. Once the session is established, Attila receives messages, decrypts them, re-encrypts them with the other side's key, and sends them along.

Have fun
felice
2016-11-11 05:06:59 UTC
128 Bit Ssl Encryption
Jack K
2008-01-01 05:05:29 UTC
There are higher encryption algorithms available ... but 128 is still the standard .... you have to have a really powerful multiple processor computer and time to crack 128 bit .... if you're worried ... encrypt your porn collection with 256 bit ... by the time you crack it you'll be too old to remember what it was for
2008-01-01 05:04:22 UTC
People who have been taught "deep code" can do just about anything they put their minds to. Bit encryption is only as good as the speed it operates at. If you have a super computer it con overcome that encryption. It would have to be a sophisticated programmer. Can't be done by wishing, lol. There are programmers constantly trying to plug all the holes that are found by other programmers in programs. The businesses that run these programs are constantly modifying them to plug holes in them, but that makes new holes that have to be plugged and so it goes on and on.



If a hacker does not know the program, that hacker assumes that the program has a hole from history of learning that program. As that program changes, lines are rewritten so as to change the instructions in that program, leaving the lesser sophisticated hacker a dead end.



Sophisticated hackers know machine language. This is a babbling language of 0s and 1s that most people could never begin to comprehend unless they quit living for a good long while. If a programmer is good at this, and mind you, if they were, they probably could not even hold a meaningful conversation with you...because their minds are pretty much mush, if they are though....good at machine language, they could take over the world....period.



Our government is on the lookout for these people. It is obvious when they do make attacks, by people who are like them. People that have this knowledge are usually autistic at best and usually have no mean streaks in them. The only way they can be manipulated is by someone who would put them up to it seeking power for themselves.
eastanglianuk1951
2008-01-01 04:55:54 UTC
Yeah but will you be allowed to SEND it.

You try... mine fail to get sent !

I only sent simple messages like... I love you... as a test.
2008-01-01 04:55:18 UTC
It has been broken but took a large bank of computers linked together with some fancy software running on them. I don't remeber for sure but seem to recall over 6 hours of time required.
2008-01-01 04:54:43 UTC
depend swhos trying to break it me or u couldnt (idont know who u r )im guessing but a lot of people can nothing is secure


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...