On Sun, Apr 06, 2008 at 10:46:25AM -0500, Dave Sherohman wrote:
> On Fri, Apr 04, 2008 at 02:43:58AM +0200, s. keeling wrote:
> > Brian McKee <[EMAIL PROTECTED]>:
> > >  On 3-Apr-08, at 1:23 PM, Dave Sherohman wrote:
> > > > Unless they take the time to successfully factor the
> > > > public key,
> > > 
> > >  Can you expand on that sentence?  I'm not sure what you meant by it.
> > 
> > I imagine he means a brute force crack.  Got a supercomputer or
> > botnet available?  Does the target use md5 passwords?  Good luck.
> 
> I do, but of a different (and much more difficult) type.
> 
> My (admittedly limited) understanding of public key crypto is that the
> public and private key are connected by the relationship of two extremly
> large prime numbers.  It is mathematically possible, then, to identify
> those numbers by factoring the numeric value of the public key and then
> use them to deduce the value of the private key.

Google "John the Ripper."

-- 
Chris.
======
If you are not subscribed, ask to be CC'd as the Policy of this list is
to reply to the list only.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to