Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment From the same wikipedia article you used (Score 1) 69

"An underlying assumption of this analysis is that the complete keyspace is used to generate keys, something that relies on an effective random number generator. For example, a number of systems that were originally thought to be impossible to crack by brute force have nevertheless been cracked in this way because the key space to search through was found to be much smaller than originally thought, due to a lack of entropy in their pseudorandom number generators. These include Netscape's implementation of SSL (famously cracked by Ian Goldberg and David Wagner in 1995[2]) and a Debian edition of OpenSSL discovered in 2008 to be flawed.[3]"

That is to say, in the case of SSL 56 bit encryption, they used the date as a seed value and did not employ the entire 56 bits (more like 40 if I remember correctly). Deep Crack was built from custom chips built for crypto and fabbed at TSMC. The 'Unbreakable' keys ( they estimated something like the life of the Universe to crack them) were being knocked off in 56 hours.

So, I reserve the right to ignore your 'estimate' of 13 trillion years and maintain the expectation of AES128 being regularly cracked in less than a week before December of 2016

Comment Re:Perpetual Motion ... (Score 2, Funny) 347

Oh, great! Now you've convinced us that this virus is going to suck all of that massive amount energy from the surrounding water causing the oceans to freeze (until Mr. Global Explosion lights his match). Concurrent doomsday scenarios, where one doomsday triggers other concomitant doomsdays: 1) If the lack of water doesn't get us, then 2) the massize cooling will get us, or else 3) the Hindenberg-like atmosphere fire will surely finish us off.

Slashdot Top Deals

"We live, in a very kooky time." -- Herb Blashtfalt