![]() |
|
|
#12 |
|
Romulan Interpreter
Jun 2011
Thailand
3×3,221 Posts |
@OP: You should ignore the small fighting and arguing here around, and don't get upset by it, or fooled by it. People here they know what they are talking about. RDS is our expert in cryptography, and if he says it is not possible, than it is not. For the "machine" you talk about, even if you used the weakest key option for it, you still have to deal with about 1.2*10^24 combinations (about 80 bits, or 2^80, using some MITM scheme). Even with a lot of computing power, you will get older, your children will get older, and your grandchildren will get older, before finishing.
|
|
|
|
|
|
#13 | |
|
Nov 2003
22·5·373 Posts |
Quote:
And I am very well aware of the difference for a BLOCK ALGORITHM SUCH AS 3DES. The former depends on the length of the plaintext. The time to do an encryption is therefore a variable dependent on plaintext length. |
|
|
|
|
|
|
#14 |
|
Tribal Bullet
Oct 2004
67278 Posts |
OP,
Modern cryptography is not a simple thing to break like it is in movies. If one random guy on the internet could guess a 3DES key by trying all the possible keys, why would anyone use 3DES? |
|
|
|
|
|
#15 | ||
|
Nov 2003
22·5·373 Posts |
Quote:
I was excoriating the OP for posting something totally off-topic and for failing to do even the most basic reading about the subject before spewing ignorance. Quote:
A MITM attack on 3DES does NOT require 2^80 time complexity. In fact, the article gives an explicit estimate for 3DES. Note also that MITM attacks have MASSIVE space requirements. Brute force attacks on block ciphers are CERTAINLY possible. They are just not PRACTICAL. |
||
|
|
|
|
|
#16 | |
|
May 2014
102 Posts |
Quote:
Hi R.D Silverman Sorry to insult your Einstein brain mate, unfortunatelly not all of us probably spent the time in maths that we were required, or perhaps i speak for my self i don´t have a freeking clue about 3DES, and yes i did google searches it would take around 2billion years to brute force. ok i know my plaintext is 128bits long / 16 byte hexadecimal plainhex information so i have for 1 byte 256 combinations from 00 to FF, ok i know its triple des so its encrypted K1K2 dividing the 112bits key into 2 64 bits keys, as i know the hardware and software that was used and due to its CPU and software limits, and taking huge amounts of time encrypt and decrypt, the tool had to use the following encryption method using 2 keys of 64bits i have the plainkey 16 bytes i have the encrypted 16 byte key all i am missing is the chipering key 3des used to encrypt data and decrypt. so i thought how many milliseconds will a normal 3des ecb decrypt aplication take to decrypt a 128bits key using a correct 3des decrypt key+encrypted content also 128bits size. ok also for a fact i know the first byte of the key does not use hexadecimal FF so that should reduce sometime... As it takes an average of 250 to 400ms to decrypt 1 message using 3DES algorithm so i can make maximum 2 to 4 attemps per second...i would need around 4billion pcs, around the scope to get som real testing done in a lifetime... Anyways i understand the bruteforce is undoable due to the amount of time required.. PS- whats amazing here is a place full of Eisteins here, and my post was still checked by another Einstein before was submitted into the open wide forum, as it was stated that my post would be submitted for clearance after a checkup by one of the mods, aparently he also does not have a clue and he allowed my post to be posted.. Last fiddled with by t3st3r10 on 2014-05-13 at 02:42 |
|
|
|
|
|
|
#17 |
|
Romulan Interpreter
Jun 2011
Thailand
966310 Posts |
Busted! That is true, I don't usually read the things I link to. The links are not for myself, but for the guys who want to read more. Once I linked to something, I know - at least vague - about the existence of that something. I just happened to know that the 3des can be attacked with MITM, and the complexity of it is close to 2^80. You can think about why is so...
And don't tell me you read all the articles you link to, before you release the posts (at least, your boosting was good, because I went back to the article and read it, thanks!)
Last fiddled with by LaurV on 2014-05-13 at 03:13 |
|
|
|
|
|
#18 | |
|
"Mike"
Aug 2002
100000001101012 Posts |
Quote:
The moderation queue is there just to block spammers and bots. We think most moderators take a laissez-faire approach to the content they allow into the forum. How else can you explain the mysterious wonders of the Miscellaneous Math sub-forum? |
|
|
|
|
|
|
#19 |
|
"Serge"
Mar 2008
Phi(4,2^7658614+1)/2
9,497 Posts |
Vee ah not heeah to suppress free sprache, ja?
|
|
|
|
|
|
#20 | |
|
Nov 2003
746010 Posts |
Quote:
do not understand and have not studied. If you know nothing about this subject, then it is reasonable to ask: What compels you to post? <plonk> |
|
|
|
|
|
|
#21 | |
|
Nov 2003
22×5×373 Posts |
Quote:
about this subject. The complexity is not "close to 2^80" except in the vague mathematical sense that any finite number can be approximated by any other finite number. The complexity is much higher than 2^80. |
|
|
|
|
|
|
#22 |
|
∂2ω=0
Sep 2002
República de California
19·613 Posts |
Ja -, I mean nein, vee ahh nicht da to engage in die Sprachfreiheitsunterdrückung, or in any uzzer achtundzwanzig-Buchstaben-long bad sings. Every contributor ist völlig frei to be as big of a Trottel, Dummkopf oder Vorchußlorbeereneinsammler [dang, I love engaging in profligate German-compound-nounery] as he vishes.
Last fiddled with by ewmayer on 2014-05-14 at 00:41 |
|
|
|
![]() |
| Thread Tools | |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Support Organizations | xilman | Soap Box | 3 | 2017-04-27 08:13 |
| Crowdfundings we support. | chappy | Lounge | 0 | 2017-02-18 01:18 |
| 5+ GPU support | TheMawn | GPU Computing | 3 | 2014-07-13 02:31 |
| Support AVX | Unregistered | Information & Answers | 5 | 2011-07-05 17:12 |
| Athlon64 support? | JuanTutors | Software | 1 | 2004-06-04 02:46 |