Originally posted by gibbl
You clearly didn't do your homework.
SSL has not been cracked. A specific implementation of SSL has been. This has nothing to do with key size.
But because I'm bored, let's check whether the numbers still hold water, or if 128-bit SSL is crackable within reasonable time. (This is probably tl;dr material unless you like seeing numbers bounce all across the place.)
The first step is looking up that document. It's here
, and its HTTP headers say March 5, 2002.
Computers have evolved. The page says that as of twelve years ago, cracking 40-bit encryption took one week. This diagram
says that making 95^10 guesses to what a password is takes ten days with cloud computing. (And even that is from 2012, but it's good enough.) That's roughly 65.7 bits. 40 bits takes 16 milliseconds. Performing a week's work in 16 milliseconds means your computer is 40 million times faster, which makes a huge dent in the time estimations.
But does that mean 128 bits takes shorter time than the age of the universe? According to my calculations, it takes 1.557 × 10^17 years to guess all possible keys at that pace, assuming the last key you try is the correct one. (You can halve it to get the average time taken, but I'll count with the worst case.)
The age of the universe is 1.4×10^10 years.
However, the password site doesn't tell which algorithm was used to create that graph, and fast password algorithms are millions of times faster than slow ones, so while it would take 11 million times the universe age to guess 2^128 passwords, it could be far faster to try 2^128 keys.
Then we can throw in that NSA most likely has specialized chips that can do nothing at all except decrypt. Since they won't need to worry about if they're decrypting or doing something else, they get faster at actually doing it. This chops off a few orders of magnitude.
Additionally, there are reasons
to believe NSA's computers are a fair bit stronger than a rented cloud. That throws the numbers off by another couple orders of magnitude.
Combined, it may lead to 128-bit keys being crackable within a human lifespan. This
suggests they can.
Of course there is a solution: Double the key size again, to 256 bits. That throws the numbers back into age-of-the-universe scale, where they belong. Security experts are paranoid, so that's what they're recommending.
But again, the amount of computing power NSA holds has nothing to do with this bug. Even 16777216 bits won't save you if you can ask the server to please tell you which bits are used.
<blm> zsnes users are the flatearthers of emulation