Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment From the same wikipedia article you used (Score 1) 69

"An underlying assumption of this analysis is that the complete keyspace is used to generate keys, something that relies on an effective random number generator. For example, a number of systems that were originally thought to be impossible to crack by brute force have nevertheless been cracked in this way because the key space to search through was found to be much smaller than originally thought, due to a lack of entropy in their pseudorandom number generators. These include Netscape's implementation of SSL (famously cracked by Ian Goldberg and David Wagner in 1995[2]) and a Debian edition of OpenSSL discovered in 2008 to be flawed.[3]"

That is to say, in the case of SSL 56 bit encryption, they used the date as a seed value and did not employ the entire 56 bits (more like 40 if I remember correctly). Deep Crack was built from custom chips built for crypto and fabbed at TSMC. The 'Unbreakable' keys ( they estimated something like the life of the Universe to crack them) were being knocked off in 56 hours.

So, I reserve the right to ignore your 'estimate' of 13 trillion years and maintain the expectation of AES128 being regularly cracked in less than a week before December of 2016

Comment Re:Perpetual Motion ... (Score 2, Funny) 347

Oh, great! Now you've convinced us that this virus is going to suck all of that massive amount energy from the surrounding water causing the oceans to freeze (until Mr. Global Explosion lights his match). Concurrent doomsday scenarios, where one doomsday triggers other concomitant doomsdays: 1) If the lack of water doesn't get us, then 2) the massize cooling will get us, or else 3) the Hindenberg-like atmosphere fire will surely finish us off.

Slashdot Top Deals

10 to the minus 6th power Movie = 1 Microfilm

Working...