[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: How to protect an encrypted file system for off-line attack?



On 02/26/2009 08:42 PM, Ron Johnson wrote:
On 02/26/2009 08:32 PM, Chris Jones wrote:
[snip]

Depending on what was encrypted, and given the time, I'm sure I'd be
able to determine, one tentative key at a time, whether the output is
gobbledygook or not..  But even if the original data was in the most
readily legible and understandable form, how do I go about separating
the output obtained with wrong candidate keys in their trillions from
that obtained with the one true key, used when the data was encrypted?

Forgot the important part: distributed.net somehow figured out how to do it, so presumably the NSA can too.

Sorry for being thick.. I don't get it.

That's ok, I'm very tolerant of Democrats.



--
Ron Johnson, Jr.
Jefferson LA  USA

The feeling of disgust at seeing a human female in a Relationship
with a chimp male is Homininphobia, and you should be ashamed of
yourself.


Reply to: