POV-Ray : Newsgroups : povray.off-topic : Cracking Server Time
29 Jul 2024 18:27:51 EDT (-0400)
  Cracking (Message 1 to 6 of 6)  
From: Invisible
Subject: Cracking
Date: 29 Jul 2011 11:36:01
Message: <4e32d361@news.povray.org>
http://www.tomshardware.com/reviews/password-recovery-gpu,2945.html

"Can we break your password with our GPUs?"



To quote Bob the builder, "yes we can!"

Perhaps the surprising thing is that (say) a 6-character password 
doesn't look all that secure, and yet an 12-character password appears 
to be utterly unbreakable. Password security does not scale linearly 
with password size. It scales exponentially.

Also, the whole analysis seems to be concerned with "all possible 
combinations". That isn't how real humans write passwords. So I'd say 
all their security predictions are more than a tad optimistic!


Post a reply to this message

From: Le Forgeron
Subject: Re: Cracking
Date: 29 Jul 2011 17:15:41
Message: <4e3322fd$1@news.povray.org>
Le 29/07/2011 17:36, Invisible nous fit lire :
> http://www.tomshardware.com/reviews/password-recovery-gpu,2945.html
> 
> "Can we break your password with our GPUs?"
> 
> 
> 
> To quote Bob the builder, "yes we can!"
> 
> Perhaps the surprising thing is that (say) a 6-character password
> doesn't look all that secure, and yet an 12-character password appears
> to be utterly unbreakable. Password security does not scale linearly
> with password size. It scales exponentially.
> 
> Also, the whole analysis seems to be concerned with "all possible
> combinations". That isn't how real humans write passwords. So I'd say
> all their security predictions are more than a tad optimistic!

And since the time the algorithm of the password cypher was made, some
people have made rainbow book. No more need to crack the password, just
look in the book for a matching salted result.

(remember, 8 significant characters... way too short against rainbow
book!). That's for your account's password.

password for archive... I guess some clear text can be guessed, which
means that simplistic approach like XOR is dead for now.
aes-128/256 should be fine, but either the random key is protected by
the password and it must be stored or the password might have some weak
bits (like ascii never set bit 7...) and the password must be
"compressed" to remove somehow these weak bits (ala DES : 8 chars, but
only 56 bits of entropy)


Post a reply to this message

From: Warp
Subject: Re: Cracking
Date: 30 Jul 2011 04:38:56
Message: <4e33c320@news.povray.org>
Invisible <voi### [at] devnull> wrote:
> Perhaps the surprising thing is that (say) a 6-character password 
> doesn't look all that secure, and yet an 12-character password appears 
> to be utterly unbreakable. Password security does not scale linearly 
> with password size. It scales exponentially.

  Why does that surprise you?

-- 
                                                          - Warp


Post a reply to this message

From: Orchid XP v8
Subject: Re: Cracking
Date: 30 Jul 2011 07:15:49
Message: <4e33e7e5$1@news.povray.org>
On 30/07/2011 09:38 AM, Warp wrote:
> Invisible<voi### [at] devnull>  wrote:
>> Perhaps the surprising thing is that (say) a 6-character password
>> doesn't look all that secure, and yet an 12-character password appears
>> to be utterly unbreakable. Password security does not scale linearly
>> with password size. It scales exponentially.
>
>    Why does that surprise you?

Because humans generally don't understand the exponential function.

Actually, I suspect that a 12-character password is only unbreakable if 
it's 12 *random* characters. A "typical" 12-character password is 
probably totally breakable!

-- 
http://blog.orphi.me.uk/
http://www.zazzle.com/MathematicalOrchid*


Post a reply to this message

From: Warp
Subject: Re: Cracking
Date: 30 Jul 2011 12:29:19
Message: <4e34315f@news.povray.org>
Orchid XP v8 <voi### [at] devnull> wrote:
> On 30/07/2011 09:38 AM, Warp wrote:
> > Invisible<voi### [at] devnull>  wrote:
> >> Perhaps the surprising thing is that (say) a 6-character password
> >> doesn't look all that secure, and yet an 12-character password appears
> >> to be utterly unbreakable. Password security does not scale linearly
> >> with password size. It scales exponentially.
> >
> >    Why does that surprise you?

> Because humans generally don't understand the exponential function.

  I thought you had an understanding of exponential functions.

-- 
                                                          - Warp


Post a reply to this message

From: Orchid XP v8
Subject: Re: Cracking
Date: 31 Jul 2011 15:21:10
Message: <4e35ab26@news.povray.org>
>>>     Why does that surprise you?
>
>> Because humans generally don't understand the exponential function.
>
>    I thought you had an understanding of exponential functions.

So did I...

-- 
http://blog.orphi.me.uk/
http://www.zazzle.com/MathematicalOrchid*


Post a reply to this message

Copyright 2003-2023 Persistence of Vision Raytracer Pty. Ltd.