On 12/21/2011 6:12 PM, Ed Leafe wrote:
>       That's a different issue than collision. With collision, you don't need 
> to know the original password; instead, you have a one in N chance of a 
> random string matching the password, where N is the total number of possible 
> values. So I could write a program to loop until the random string it creates 
> is accepted on your side because your algorithm generated the same number as 
> the actual password. In this case, on average it would only take 64K tries 
> before I got in, which, given today's processing power, might take a minute 
> or two.


I guess that's why some websites will lock you out after 'n' (usually 
3-5) failed attempts.  Then you have to call/email them to unlock it.


-- 
Mike Babcock, MCP
MB Software Solutions, LLC
President, Chief Software Architect
http://mbsoftwaresolutions.com
http://fabmate.com
http://twitter.com/mbabcock16

_______________________________________________
Post Messages to: ProFox@leafe.com
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/4ef2a43a.3040...@mbsoftwaresolutions.com
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to