[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: How to protect an encrypted file system for off-line attack?



On Tue, Feb 24, 2009 at 12:56:00AM EST, Ron Johnson wrote:
> On 02/23/2009 08:43 PM, Javier wrote:
> [snip]
> >
> >
> >As I also have read in the Wikipedia, it is reseonable to crack a 56bits
> >DES, a 64bits AES if you have online access to the machine, and probably
> >in the future it might be possible to crack a 128bits, even offline.
> >But, a 256 one? It seems incredible to me. 2^256 is this number:
> >
> >
> >115792089237316195423570985008687907853269984665640564039457584007913129639936
> >
> >which is 10^79 iterations, I can't imagine the amount of power needed
> >for cracking that...
> >Isn't 4x10^80 the amount of atoms in the universe?
> 
> 25 years ago, I had a KayPro II with CP/M, 64KB RAM and 2 380KB 
> FDDs.  (Sun 2s of the same era had a 10MHz MC68010, 4MB RAM and cost 
> $44,000.)  Now, I've got 131,000x more RAM, 2000x more MHz and pair 
> of CPUs, and 790x more disk space.
> 
> What kind of specialized crackers does the NSA have now, and how 
> much faster and smaller (thus higher rack density) will they be in 2035?

Sorry to revive and already dead thread .. 

I have a naive question. 

While your brute force decryption is running, how do you determine you
have found the "one key" and decide it's time to stop?

Among trillions of trillions, when do you know you've hit the jackpot?

The answer is probably obvious but I just don't see it.


Reply to: