Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Yep (Score 1) 407

No.

I'll pick RSA 1024-bit public/private key crypto as my example. A 1024-bit key only takes 128 bytes.

Wikipedia says that 1E18 Joules is an absolute minimum for brute-forcing a single AES-128 key. (Unless you can invent an entirely different kind of computer - see quantum computers.) I'll be nice and let you do it at that cost, even though generally that would be considered impossible.

If you can brute-force 128 bits for 1E18 Joules, you only need to repeat that effort twice for each additional bit. (1024-128)*log(2)/log(10)+18 = 287.723. If my calculations are correct, that's 1E287 Joules required to brute force a 1024-bit key. Even if there's a way to speed that up 100 times, 1E285 Joules is more than a googol squared (1E100*1E100) times the total mass-energy of the observable universe.

After you've surrounded the entire universe in some kind of collector and annihilated all matter inside it to power your key-cracker, you'll have cracked just 297 bits!

Now I've hand-waved away a lot of multipliers that would actually affect your choice of implementation but the fact stands: no, the encryption cannot be brute-forced with "enough hardware and time."

Comment Re:You have got to be... (Score 1) 284

Re; "article must be a joke" ...

You must be new here.

Now to say something more helpful: good luck getting the vendor to agree to anything. The equipment has been sold, signed, and delivered. Whatever contract was put in place by the CEO over golf, that's what you get to try and work with.

But is it worth turning into a BOFH just to screw the manufacturing guys?

If the problem is really as bad as it sounds, maybe it's time to start looking for another job.

Comment Re:You are wrong. (Score 4, Interesting) 299

Examples of snooping that lack the ability to do a MITM attack:

1. Listening to an encrypted wifi session, then breaking the encryption offline

2. Tapping into undersea fiber (the listening party is going to have a hard enough time exfiltrating the snooped bytes; setting up a "take over" command and associated equipment is prohibitive due to both the technical and political risks)

3. Listening device inside a government facility. China famously does this for example by using a small office-supply firm to get equipment into a US facility somewhere is Asia; the copy machine has a hard drive like any copy machine and there's nothing suspicious about that, right? And then you find the second, and the third, and the fourth hard drive hidden in places you would never look. The data is exfiltrated only when the machine is replaced as part of a regular service contract.
Need I go on?

Slashdot Top Deals

It's time to boot, do your boot ROMs know where your disk controllers are?

Working...