Soldato
- Joined
- 24 Nov 2002
- Posts
- 16,379
- Location
- 38.744281°N 104.846806°W
I found out what I thought was my weakest password was actually the strongest!Haha cool my PC password would take 19,558 hours![]()
I found out what I thought was my weakest password was actually the strongest!Haha cool my PC password would take 19,558 hours![]()
I don't understand how people are reaching the conclusions that they're reaching (timewise).
So a file encrypted using adobe professional will take the same amount of time it would to crack a file encrypted with truecrypt (aes/twofish/serpent encryption, ripemd-160 hash alg for instance), assuming they're using the same passphrase/number of chars?.
Surely people need details of the method of encryption used by adobe professional?.
I'm rocking 24 char pw's in truecrypt atm, and now I'm slightly worried lol. Not that I have much to hide, but I would at least like it to work..
A password is a password no matter what kind of encryption it unlocks. Cracking it is the same regardless, it just takes brute force as it's the PW you are cracking not the encryption. A 24 character password would take even a supercomputer thousands of years if not more to crack. So long as there is no other ways in, for example you can basically disable MS Word encryption easily by modifying the file (or you used to be able to) then you're fine!
bruteforcing a password of the same length, with the same character set will always have the same theoretical maximum time
I can't find any quick info on the password combinations involved, but assuming you could get 100 cards running and order them in such a way that they aren't replicating combinations, that's 330bn combinations per second. That seems like a hell of a lot. But then I have no idea how combinations/permutations evolve with each character.
bruteforcing a password of the same length, with the same character set will always have the same theoretical maximum time
Each additional character increases the number of possible passwords by a factor of the character set - I think it's around 170 on a standard keyboard, so 170^length. When brute-forcing passwords, it's fairly interesting to look at collision statistics as well. Your 20-something character password won't help you much if it hashes to the same value as 'a' - unlikely, but possible (and much more likely than you think - if you want proof, check out the Birthday problem).
however I have used Sophos (used to be Utimaco) Safeguard in government before with no issues.
So a file encrypted using adobe professional will take the same amount of time it would to crack a file encrypted with truecrypt (aes/twofish/serpent encryption, ripemd-160 hash alg for instance), assuming they're using the same passphrase/number of chars?.
Yes because it's a brute force attack, the only thing that matters is the complexity of the hashing algorithms used to turn the password into a key which are standardised these days anyway, the more complex the algorithm the slower the brute force.
When the entropy of the password reaches that of the key itself then it is much faster to brute force encryption using keys rather than passwords because the hashing algorithm is bypassed.
So a 128-bit key would need a 22 character alpha numeric password to offer the best security, 256-bit would require 43 characters. If your using 3 different 256-bit keys then you need 44 characters.
I would have thought that it would take a hell of a lot longer actually testing each password.
That would be 22 chars with maximum entropy though and humans fail at remembering entropy. Anything remotely memorable would need significantly more characters to hash to a decent 128 bits.
This. How would the cracker know if it was correct or not without testing each one and surely the server wouldn't allow it to test that many passwords?