Post
Topic
Board Bitcoin Discussion
Re: 8 Prime Spirals SHA-based De-cryption? Private Keys
by
Vessko
on 27/11/2014, 20:38:20 UTC
Snowden documents say ECC is back doored by NSA right?

Wrong.

Quote
The little I've read

I suggest that you read more.

Quote
on the back door is it was done by corrupt seed keys.

As I said, there are issues with the NIST curves. That doesn't necessarily mean that they are compromised (despite the speculation to the contrary, the NSA actually strengthened DES with their modification, using their superior knowledge of an attack that was not yet known to the civilian sector), but it is enough to make them suspicious.

However, nobody forces you to use these particular curves. Even if they are backdoored, this doesn't compromise the ECC itself. I still dislike ECC and prefer RSA instead - but that's just my own personal problem; I understand RSA better.

Quote
So the NSA has the known relationship they won't have to divide by anything to find anything, they control the seed keys and already know the special relationship according to the Snowden docs.

So, use different "keys" (curves, really, your ignorance is breathtaking), not "seeded" by the NSA.

Quote
Now if anyone wants to say that ECC is secure and Snowden is wrong, the show the articles. From all I've read ECC is back doored and the NSA used NiSt to do it right?

Wrong. All we know from Snowden is that the NSA used NIST to promote the acceptance of weak algorithms. This doesn't mean that ECC is insecure. It might be that the particular ECC curves suggested by NIST are insecure. If you believe that to be the case, use different ones. Or it might mean that the NSA tampering is in a completely different place.

Quote
The rest is speculation

Yep. Like most of what you have posted here.

Quote
ECC is corrupted

We don't know that.

Quote
and it was done with seed keys from the NSA, so the seed key developer has the the skeleton key it's not a formula using division or whatever, it's a formula that uses the relationship between the two seed keys released by NiST and if they did it with one type of ECC who is to say it wasn't done with all ECC.

NIST did not invent ECC. The NSA did not invent ECC. You clearly don't know what ECC is. The best one can claim is that the NSA made NIST suggest a weak elliptic curve. That claim cannot be proven, but even if it is true, one can use other curves and still use ECC.

And, again, all this has absolutely nothing to do with Bitcoin. It doesn't even have anything to do with the touted Adoni/Croft "spirals", factorization, prime number generation and primality testing algorithms.