-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sebastian Wiesner wrote:
| "Jason Rivard" <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 23:53:23
[snip]
| A OTP cannot be broken using brute force, so the term "perfectly secure"
| fits here, imho, at least a bit ;)
A OTP cipher would be *theoreti
On Thursday 26 June 2008, Chris Walters wrote:
> Sebastian Wiesner wrote:
> | I don't and I did not say so, things like the Debian disaster bring
> | you back to reality from dreams ...
This is the favoured method of cracking encryption - misuse by the user.
The canonical example is of course En
Alan McKinnon wrote:
The calculation is quite simple - measure how quickly a specific
computer can match keys. Divide this into the size of the keyspace. The
average time to brute force a key is half that value. AFAIK this still
averages out at enormous numbers of years, even at insane calculat
Alan McKinnon <[EMAIL PROTECTED]> at Thursday 26 June 2008, 10:54:43
> The calculation is quite simple - measure how quickly a specific
> computer can match keys. Divide this into the size of the keyspace. The
> average time to brute force a key is half that value. AFAIK this still
> averages out a
On Thursday 26 June 2008, Sebastian Wiesner wrote:
> Alan McKinnon <[EMAIL PROTECTED]> at Thursday 26 June 2008,
> 10:54:43
>
> > The calculation is quite simple - measure how quickly a specific
> > computer can match keys. Divide this into the size of the keyspace.
> > The average time to brute fo
I submit that brute forcing an AES key of reasonably length is
currently impossible in an amount of time that would matter to the human
race.
On average yes.
As already pointed out, however, there is nothing
to prevent the first guess from matching a key and
cracking one particular examp
Steven Lembark wrote:
I submit that brute forcing an AES key of reasonably length is
currently impossible in an amount of time that would matter to the
human race.
On average yes.
As already pointed out, however, there is nothing
to prevent the first guess from matching a key and
cracki
Steven Lembark <[EMAIL PROTECTED]> at Thursday 26 June 2008, 23:52:17
> > I submit that brute forcing an AES key of reasonably length is
> > currently impossible in an amount of time that would matter to the
> > human race.
>
> On average yes.
>
> As already pointed out, however, there is nothi
8 matches
Mail list logo