From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([69.77.167.62] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1KBzgE-0006I5-6r for garchives@archives.gentoo.org; Thu, 26 Jun 2008 22:11:02 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id D3CD4E03E0; Thu, 26 Jun 2008 22:10:32 +0000 (UTC) Received: from poseidon.rz.tu-clausthal.de (poseidon.rz.tu-clausthal.de [139.174.2.21]) by pigeon.gentoo.org (Postfix) with ESMTP id ACDFDE03E0 for ; Thu, 26 Jun 2008 22:10:32 +0000 (UTC) Received: from poseidon.rz.tu-clausthal.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id CC34820AEFA for ; Fri, 27 Jun 2008 00:10:31 +0200 (CEST) Received: from tu-clausthal.de (poseidon [139.174.2.21]) by poseidon.rz.tu-clausthal.de (Postfix) with ESMTP id BAF8E20AEF9 for ; Fri, 27 Jun 2008 00:10:31 +0200 (CEST) Received: from [139.174.197.94] (account wevah HELO energy.localnet) by tu-clausthal.de (CommuniGate Pro SMTP 5.2.4) with ESMTPSA id 35432667 for gentoo-user@lists.gentoo.org; Fri, 27 Jun 2008 00:10:31 +0200 From: Volker Armin Hemmann To: gentoo-user@lists.gentoo.org Subject: [gentoo-user] h Date: Fri, 27 Jun 2008 00:10:20 +0200 User-Agent: KMail/1.9.51 (Linux/2.6.26-rc8r4; KDE/4.0.83; x86_64; ; ) References: <4861AB64.9000709@comcast.net> <200806262214.30158.basti.wiesner@gmx.net> <200806262239.42820.alan.mckinnon@gmail.com> In-Reply-To: <200806262239.42820.alan.mckinnon@gmail.com> Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200806270010.20819.volker.armin.hemmann@tu-clausthal.de> X-Virus-Scanned: by PureMessage V5.4 at tu-clausthal.de X-Archives-Salt: 437e945d-a2cb-47f0-a430-b9ff680187f0 X-Archives-Hash: bb93b6bc16f21e07a271060dd1e4ddb6 On Donnerstag, 26. Juni 2008, Alan McKinnon wrote: > On Thursday 26 June 2008, Sebastian Wiesner wrote: > > Alan McKinnon at Thursday 26 June 2008, > > 10:54:43 > > > > > The calculation is quite simple - measure how quickly a specific > > > computer can match keys. Divide this into the size of the keyspace. > > > The average time to brute force a key is half that value. AFAIK > > > this still averages out at enormous numbers of years, even at > > > insane calculation rates like what RoadRunner can achieve. > > > > According to Wikipedia RoadRunner is designed for 1.7 petaflops in > > peak. Assuming for the sake of simplicity, that decryption can be > > performed within a single flop: > > > > (2^256) / (1.7 * 10^15) / 2 ~= 3.5 * 10^61 > > > > In years: > > > > 3.5 * 10^61 / 3600 / 24 / 356 ~= 10^54 > > > > Correct me if I'm wrong, but it seems impossible to me, to reduce > > this get the required amount somewhere near to the life time of a > > human being ;) > > Even with your ultra-liberal assumptions, it still comes out to: > > 1000000000000000000000000000000000000 > > times longer than the entire universe is believed to have existed thus > far (14 billion years). That is an unbelievable stupendously long > period of time. Yeah, I'd agree that brute force is utterly unfeasible > as a vector of attack. Not even the almighty NSA could ever pull that > one off as there simply aren't enough atoms in the universe to make a > supercomputer big enough. > > Numbers don't lie. and this is why nobody uses brute force. There a better ways to crack keys. NSA has tons of experts in mathematics and cryptoanalysis. Plus very sophisticated hardware. I am sure for most ciphers they use something much more efficient than stupid brute force. -- gentoo-user@lists.gentoo.org mailing list