
Second: 26^18+26^17+26^16 is equal to (1+1/26+1/(26^2)+....) * 26^18 which is roughly equal to 1.0X * (18 combinations in a nutshell

lexaal wrote:QUOTE (lexaal @ Aug 11 2013, 05:45 PM) First: it is not 18^26+17^26+... It is 26^18+26^17+26^16... (mrc=noob)![]()
Second: 26^18+26^17+26^16 is equal to (1+1/26+1/(26^2)+....) * 26^18 which is roughly equal to 1.0X * (18 combinations in a nutshell) ... shorter combinations don't really count.
MrChaos wrote:QUOTE (MrChaos @ Aug 12 2013, 10:05 AM) Me being too lazy to check my assumptions
Well noone worth their salt is using old encryption standards these days. It is true that older encryption standards can and were compromised mathematically via computation, but those days are over largely. Asymmetric encryption, which forms the basis of PKI, raises the bar of required computation time so high that its safe to call it impossible. Possible being something that you could sit down and do, or order to be done in a reasonable amount of time. The heat death of the universe is not a reasonable amount of time, nor is 10,000 or even 100 years.TakingArms wrote:QUOTE (TakingArms @ Aug 12 2013, 06:32 AM) I know only the most basic rudiments of cryptology but I understand that it's a serious science with graduate programs of study dedicated to it. My understanding is that the bottom line is that anything can be decrypted given sufficient resources and time, and those doing the encrypting hope only to make it take too long for the decrypting process to yield anything practical.
The government has been doing this stuff for a long time (since WWII at least), has a lot of resources, and can likely decrypt almost anything very quickly that doesn't use a really strong encryption process.
I do recall when PGP first hit the scene, the US government tried to shut it down. I think they feared nefarious groups would use it to communicate and make it far more difficult for the government to use electronic surveillance. That failed and it's been over 20 years and PGP is still around. I'm guessing the government has found ways to cope.
The conclusion I'm driving at is I don't think encryption is the answer to government intrusion into your privacy. In all likelihood, if they want to, they can crack it. The solution is keeping your government accountable, repealing stupid laws like the Patriot act, and requiring approval of an independent judiciary with actual probable cause before a government is allowed to exercise electronic surveillance against anyone.
It all becomes a matter of size again:lexaal wrote:QUOTE (lexaal @ Aug 12 2013, 12:21 PM) Third:
![]()
![]()
![]()
![]()
But back to the original point... which I forgot.. but hey, what are you doing next weekend?
"HelloMyNameIsNotSlimShady" vs "5SAk$ji}%" size doesn't matter... it's how you are using it.![]()
So 5SAk$ji}%1 and sorry sugar, I'm off finding bigger things to do next weekend. Hey do not worry your secret is definitely safe now that I know the proper way to do things. I will always remember it as times immoral and simply too much funlexaal wrote:QUOTE (lexaal @ Aug 11 2013, 05:45 PM) First: it is not 18^26+17^26+... It is 26^18+26^17+26^16... (mrc=noob)![]()
Second: 26^18+26^17+26^16 is equal to (1+1/26+1/(26^2)+....) * 26^18 which is roughly equal to 1.0X * (18 combinations in a nutshell) ... shorter combinations don't really count.
Continuing on the size matters theme holy @#(! but it seems only to a point than the motion of the ocean takes over again. Hey as we've seen a number of times already wtf do I really know about this stuffgermloucks wrote:QUOTE (germloucks @ Aug 12 2013, 03:49 PM) Well noone worth their salt is using old encryption standards these days. It is true that older encryption standards can and were compromised mathematically via computation, but those days are over largely. Asymmetric encryption, which forms the basis of PKI, raises the bar of required computation time so high that its safe to call it impossible. Possible being something that you could sit down and do, or order to be done in a reasonable amount of time. The heat death of the universe is not a reasonable amount of time, nor is 10,000 or even 100 years.
Thats not even the right way to attack asymmetrically encrypted data. You dont screw around trying to guess the other half of a key, you compromise the systems that support the encryption and therefore bypass the whole thing. You see, PKI requires a complicated infrastructure to support it. You need servers that do different roles of generating certificates, registering them, binding them to particular user objects in active directory, a method of validating certificates, etc etc etc. In some schema, there is a whole chain of transitive trust from certificate publshing companies like Verisign and symantec all the way down to a corporations certificate authority. The more complicated something is, the more ways it can be compromised.
So the point im drving at is that no, the government isnt cracking asymmetric encryption keys, they are compromising your computer through vulnerabilities in other programs and plucking the key itself out. Or if they cant get the key, they'll serve you with a court order to decrypt it yourself. Either way the method itself lives up to the hype, its the fact that the encryption methods are a part of a broader insecure infrastructure it has to rely on.
Symmetric encrption, where the key to encrypt is the same as the one used to decrypt, is also mathematically safe. An AES 128 bit key would take 1.02 X 1018 years to decrypt by guessing. Again the vulnerability is not in guessing the key but in compromising the system to obtain the key. AES also supports 256 bit encrption keys as well, making it even more impossible to guess. 1056 years