> I think you can't *really* estimate the time to crack a password, all
> you can show is the maximum time it will take to try out all possible
> combinations.
Yes. And that's what lets you make a statistical model: "there's a 25%
chance it'll take this long, a 50% chance it'll take this long," e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Am 17.06.2015 um 01:45 schrieb Robert J. Hansen:
>> Is this a correct interpretation?
>
> Pretty close.
>
>> My understanding of en-/decryption is that there is no
>> indication of progress toward finding a successful key match of a
>> given encryp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/16/2015 06:28 PM, James Moe wrote:
> Hello, My understanding of en-/decryption is that there is no
> indication of progress toward finding a successful key match of a
> given encryption. Only when the key is exactly correct will the
> encrypte
> Is this a correct interpretation?
Pretty close.
> My understanding of en-/decryption is that there is no indication of
> progress toward finding a successful key match of a given
> encryption.
Not quite. If you're doing a brute-force attack it's easy to figure out
what fraction of the possib
Hello,
My understanding of en-/decryption is that there is no indication of
progress toward finding a successful key match of a given encryption.
Only when the key is exactly correct will the encrypted data be revealed.
I have seen numerous TV and movie stories where someone is
frantically atte