Re: General brute force attack question

2015-06-17 Thread Robert J. Hansen
> I think you can't *really* estimate the time to crack a password, all > you can show is the maximum time it will take to try out all possible > combinations. Yes. And that's what lets you make a statistical model: "there's a 25% chance it'll take this long, a 50% chance it'll take this long," e

Re: General brute force attack question

2015-06-17 Thread Daniel Krebs
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Am 17.06.2015 um 01:45 schrieb Robert J. Hansen: >> Is this a correct interpretation? > > Pretty close. > >> My understanding of en-/decryption is that there is no >> indication of progress toward finding a successful key match of a >> given encryp

Re: General brute force attack question

2015-06-16 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 06/16/2015 06:28 PM, James Moe wrote: > Hello, My understanding of en-/decryption is that there is no > indication of progress toward finding a successful key match of a > given encryption. Only when the key is exactly correct will the > encrypte

Re: General brute force attack question

2015-06-16 Thread Robert J. Hansen
> Is this a correct interpretation? Pretty close. > My understanding of en-/decryption is that there is no indication of > progress toward finding a successful key match of a given > encryption. Not quite. If you're doing a brute-force attack it's easy to figure out what fraction of the possib

General brute force attack question

2015-06-16 Thread James Moe
Hello, My understanding of en-/decryption is that there is no indication of progress toward finding a successful key match of a given encryption. Only when the key is exactly correct will the encrypted data be revealed. I have seen numerous TV and movie stories where someone is frantically atte