From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([69.77.167.62] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1KBwJL-00076J-Qb for garchives@archives.gentoo.org; Thu, 26 Jun 2008 18:35:12 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 973E2E04BC; Thu, 26 Jun 2008 18:35:10 +0000 (UTC) Received: from www01.badapple.net (www01.badapple.net [64.79.219.163]) by pigeon.gentoo.org (Postfix) with ESMTP id 63D3AE04BC for ; Thu, 26 Jun 2008 18:35:10 +0000 (UTC) Received: from [172.21.228.122] (fa0-1-wlan-rtr.corp.yahoo.com [216.145.49.5]) (Authenticated sender: ramin@badapple.net) by www01.badapple.net (Postfix) with ESMTP id 67A5F26F4001 for ; Thu, 26 Jun 2008 11:35:08 -0700 (PDT) Message-ID: <4863E15A.80009@badapple.net> Date: Thu, 26 Jun 2008 11:35:06 -0700 From: kashani User-Agent: Thunderbird 2.0.0.14 (Windows/20080421) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 To: gentoo-user@lists.gentoo.org Subject: Re: [gentoo-user] My last words on cryptology and cryptography. References: <4861AB64.9000709@comcast.net> <200806260011.00224.basti.wiesner@gmx.net> <4862FD4F.8070303@comcast.net> <200806261054.43706.alan.mckinnon@gmail.com> In-Reply-To: <200806261054.43706.alan.mckinnon@gmail.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Archives-Salt: f6ac2d56-b33f-4ec1-92ff-3b2f9f5e1dcd X-Archives-Hash: e22e1cecdb6099f7b60063eba204a31f Alan McKinnon wrote: > The calculation is quite simple - measure how quickly a specific > computer can match keys. Divide this into the size of the keyspace. The > average time to brute force a key is half that value. AFAIK this still > averages out at enormous numbers of years, even at insane calculation > rates like what RoadRunner can achieve. 256 bit keys. The 115792089237316195423570985008687907853269984665640564039457584007913129639936 keys are quite a lot to check (although, if all the atoms in the universe [estimated 10^78] were to test 1 key/sec, it'd only take about 0.1157920892 seconds). However.. 512 bit keys with all the atoms testing a trillion keys/second would take about (2^512)/(10^78)/60/60/24/(36525/100)/(10^12) or 4.2486779507765473608e56 years.. I submit that brute forcing an AES key of reasonably length is currently impossible in an amount of time that would matter to the human race. kashani -- gentoo-user@lists.gentoo.org mailing list