- #1
gva
- 50
- 1
I got a freeware encryption software with only 128 bit. How fast it is for hackers to crack 128 bit file encryption?
Greg Bernhardt said:A long time
http://www.inet2000.com/public/encryption.htm
Passwords and the encryption standard (128 bit in this case) have nothing to do with each other. The encryption is done exactly the same way whether you have a 3 character password or a 300 character password.gva said:But in file encryption software, it seems related to the password. For example I just use a 5 letter password.. how's the password related to the 128 bit encryption
phinds said:Passwords and the encryption standard (128 bit in this case) have nothing to do with each other. The encryption is done exactly the same way whether you have a 3 character password or a 300 character password.
Hacking an encryption means bypassing the password completely.
Of course, if you use a simple password, then they don't HAVE to crack the encryption, they just figure out your password and then they are in regardless of the encryption being used.
Greg Bernhardt said:A long time
http://www.inet2000.com/public/encryption.htm
It's a private key. It is not transmitted. There is a public key for use in ENcrypting things but only the private key will DEcrypt.GTOM said:What prevents intercepting the key itself?
Jim, according to what I have read, if computers get 1,000,000 times faster than they are today it would still take longer than the current age of the universe to brute force hack a 128 bit codejim mcnamara said:@gva 128 AES is breakable but is still actively used in the ssh 2 protocol. Why? Because nobody is going to spend a week of supercomputer time cracking your email.
phinds said:Jim, according to what I have read, if computers get 1,000,000 times faster than they are today it would still take longer than the current age of the universe to brute force hack a 128 bit code
phinds said:It's a private key. It is not transmitted. There is a public key for use in ENcrypting things but only the private key will DEcrypt.
No, it is simply a statement of fact about brute force hacking. It makes no assumptions at all and has nothing to do with other methods.GTOM said:That of course, assumes that brute force is the only way.
The exact time it takes for hackers to crack 128 bit file encryption varies depending on several factors such as the strength of the encryption algorithm, the computing power of the hacker, and the methods used to attempt to crack the encryption. However, a 128 bit encryption key is considered extremely secure and can take billions of years for hackers to crack through brute force methods.
In theory, any encryption algorithm can be cracked given enough time and resources. However, 128 bit encryption is considered highly secure and the probability of hackers successfully cracking it is extremely low. It is widely used by governments, financial institutions, and other organizations to protect sensitive information.
Yes, there are some techniques that hackers can use to potentially speed up the process of cracking 128 bit encryption. These include using more advanced computing hardware, exploiting vulnerabilities in the encryption algorithm, or using social engineering to obtain the encryption key. However, these methods are not foolproof and can still take a significant amount of time to successfully crack the encryption.
The time it takes to crack 128 bit file encryption can vary depending on the computing power available. It is theoretically possible for a single person to crack the encryption, but it would likely take an extremely long time. It is more common for hackers to work in teams and use multiple computers to speed up the process.
To ensure the security of your data against potential hackers, it is important to use strong encryption algorithms such as 128 bit encryption. It is also crucial to regularly update and strengthen your encryption keys, use secure passwords, and implement other security measures such as firewalls and antivirus software. It is also recommended to regularly back up your data in case of a successful hack attempt.