Reply to Re: Cracking encrypted data?

Your name:

Reply:


Posted by Sjoerd on 12/18/52 11:50

veg_all@yahoo.com wrote:
> How easy is it to find the keyif you know parts of the encrypted data
> are equal to common words like name, email, etc.
>
> I am using blowfish to encrpyt my client data on the server. My fear
> is if someone breaks into the server they could examine the source
> code and quickly tell which parts of the encrypted data correspond to
> certain commonly used strings . So given that knowledge would they
> easily
> be able to crack it?
>
> When security sites publish times it takes to crack the key of
> encrypted data, does that assume the crackers already know what the
> data should say?

One way to crack a key is to try out all keys. Because there could be
very many keys, for example 2^128 =
340282366920938463463374607431768211456
This is unfeasable because it would take a lot of time. If a name is
used, there are approximatly
348055848 entries
(source: 2 * male names * surnames,
ftp://ftp.cerias.purdue.edu/pub/dict/wordlists/names/)

With 100.000 tries per second, a specific cipher can be decoded in one
hour.

In other words, your key should be as random as possible. Any cracking
data is based on a random key.

[Back to original message]


Удаленная работа для программистов  •  Как заработать на Google AdSense  •  England, UK  •  статьи на английском  •  PHP MySQL CMS Apache Oscommerce  •  Online Business Knowledge Base  •  DVD MP3 AVI MP4 players codecs conversion help
Home  •  Search  •  Site Map  •  Set as Homepage  •  Add to Favourites

Copyright © 2005-2006 Powered by Custom PHP Programming

Сайт изготовлен в Студии Валентина Петручека
изготовление и поддержка веб-сайтов, разработка программного обеспечения, поисковая оптимизация