Dismiss Notice
Join Physics Forums Today!
The friendliest, high quality science and math community on the planet! Everyone who loves science is here!

Decrypting files & forgotten password

  1. Jun 26, 2018 #1
    About 8 years ago. I put all my documents and pictures in dvd and encrypted them using Axcrypt 128 encryption software. I forgot the password. I need to open up some files. Any idea how to decrypt them? What company can decrypt them and how fast would it take?
     
  2. jcsd
  3. Jun 26, 2018 #2

    jedishrfu

    Staff: Mentor

    I don’t think you’re going to succeed without the password. These types of software are designed to be secure meaning it’s very difficult to crack.

    A better strategy is to think what password you might have used like an old phone number, address... as people tend to use the same passwords over and over. Also you don’t think you stashed the password somewhere like on the DVD case or under the DVD insert.
     
  4. Jun 27, 2018 #3
    I totally forgot it. I chose my password by thinking randomly any object at that moment and I forgot what I thought of 8 years ago.. and it's combination of objects and adding some symbols too.

    Supposed quantum computer can exist in the future.. how long would it take to decrypt a 128 bit file?
     
  5. Jun 27, 2018 #4

    anorlunda

    Staff: Mentor

    You mean 128 bit key, not 128 bit file, correct?

    NSA could probably do it today.

    If you are really serious about retrieving the data, and you have the money, I suggest hypnosis to help you remember the password.

    Don't forget, even if you have the key, you also need a machine to run that Acrypt software.
     
  6. Jun 27, 2018 #5

    Vanadium 50

    User Avatar
    Staff Emeritus
    Science Advisor
    Education Advisor
    2017 Award

    You are almost certainly better off by trying candidate passwords. Say 200000 words, and up to five symbols, with 20 symbols possible. That's 239 which is much, much smaller than 2128. If it takes a millisecond to run a trial, you can do this in 20 years per core. If it takes a microsecond, you can do this in one week per core.
     
  7. Jun 27, 2018 #6
    It's 128 bit key. In case a quantum computer got developed in future.. how would it decode the 128 bit key? does it try every combination of passcodes? but I heard convensional computer is equally fast in trying out all combinations..

    The documents and pictures with lost encryption password is saved in Milleniata M-disc which can last for 1000 years.. so it can await the day quantum computer would become a reality.
     
  8. Jun 27, 2018 #7

    Vanadium 50

    User Avatar
    Staff Emeritus
    Science Advisor
    Education Advisor
    2017 Award

    You're asking how long it would take a piece of technology that doesn't even exist yet to do an unspecified amount of work. If I said 11.23487651 hours, would you believe me? If not, why not?
     
  9. Jun 28, 2018 #8

    jedishrfu

    Staff: Mentor

    Try going back to the place where you did the encryption perhaps sitting there will jog your memory but really people are often afraid to use totally random stuff so my guess is its something that means something to you address, phone #, booktitle, book author, funny saying...
     
  10. Jul 4, 2018 #9
    Do you still have the system drive from the machine on which you did the encryption? It's possible, although not likely, that it still has a cached copy of the passphrase. It's not likely, because the cache is normally cleared when the Windows session is ended.

    To check the possibility, you could make a sector-by-sector, including empty sectors, physical clone of the drive, copying all sectors byte-by-byte, to a same-sized or larger drive on which all sectors have been write-initialized to binary zeroes, then boot from the clone, and attempt to open one of the .axx files from the context menu. If that doesn't work, it's possible that the passphrase could still be found with more exhaustive methods, but again. not very likely.

    Probably your best option at that point, other than somehow remembering the passphrase, would be a dictionary attack, as @Vanadium 50 suggested, with a lexicon that is reduced in size by use of what lexical characteristics of the passphrase you can remember, such as whether you used all lowercase, used only common nouns, used only a subset of available numeric or special characters only at the start or end of the phrase, etc.. Anything you can eliminate from consideration reduces the number of possibilities you have to test for.

    The difficulty of finding a better than brute force method for producing the key from the remaining possibilities is roughly that of finding the largest prime factors of a very large integer -- a quick method for doing that has not been proven, as far as is publicly known, to not exist, but as far as we know. Gauss, and other luminaries, tried without success to find one or prove that none could be found.

    Although correctly implemented AES 128 is not known to be, or believed by experts to be, susceptible to a known-plaintext attack, the fact that image files have common header information can be used to check the candidate passphrases more quickly.
     
    Last edited: Jul 4, 2018
  11. Jul 4, 2018 #10
    You always hear the news quantum computer can crack encryptions. Just wanna have general idea.. do they do it by trying out every combinations of words in the dictionary?

    Millianiata M-disc bluray can last for 1000 years.. so maybe 300 years from now.. my descendant can open the files by having a personal quantum decryptor?
     
  12. Jul 4, 2018 #11
    The dictionary attack works by first reducing the size of the problem. It tests only the likelier candidates for the passphrase used to generate the actual encryption key, rather than testing all the possible values of that key.

    As a rule, unless the passphrase is very long, and very random, the number of possibilities for it is apt to be much smaller than 2^128, and as Vanadium 50 pointed out, the smaller number of possibilities could be manageable using conventional computational equipment that is readily available to private individuals.

    Regarding use of quantum computers for decryption: fundamentally, the special capabilities of hypothetical quantum computing devices in the decryption arena are predicated upon quantum superposition phenomena that have been reliably observed under laboratory conditions.

    Conceptually, and non-rigorously:

    The two possible values for a normal bit, i.e. a binary digit, conventionally 1 and 0, could be visualized as being represented as the North and South poles at the opposite ends of an axis running through the center of a spinning sphere, the axis of spin being perpendicular to the equatorial plane that lies parallel to the direction of spin.​

    In the case of a qubit, i.e. a quantum bit, there is no pre-determined orientation of that equatorial plane, so no yet-singular axis of spin, so no definite points to map to the two surface points at the opposite ends of the axis of spin. By superposition, before measurement intervenes, all the points on the surface are spin-axial endpoints simultaneously. For the decryption purpose, constructs are envisioned whereby a correct match, and only a correct match, will trigger the measurement, thereby eliminating all the other possibilities at once, and so selecting the correct one.​

    Preliminary and ongoing experimentation strongly suggests that such an approach should be viewed as promising, but for practical purposes, as far as is publicly known, a working device with a sufficient number of qubits, and a sufficiently rapid, robust, and fully usable set of interfaces, is not yet available, and if such an assemblage becomes available, in the not especially immediate future, it will in its earliest manifestations continue to be cost-prohibitive for the decryption exigencies of ordinary private individuals.
    I think it's not unlikely that something, whether it's quantum-based or not, will in time be able to accomplish such a purpose.
     
    Last edited: Jul 4, 2018
  13. Jul 4, 2018 #12

    f95toli

    User Avatar
    Science Advisor
    Gold Member

    A quantum computer might not be any faster than a conventional computer for a problem like this, at least not if the password is completely random (if it is not I guess i might be possible re-formulate it as a database search or optimization problem in which case a QC might help).
    Quantum computers can break protocols that are based on the fact fact that some mathematical operations -such as factorization- are very hard (computationally expensive) on a classical computer but "easy" on a quantum computer. The typical example is RSA which is used for nearly all secure network communication; a quantum computer does NOT break RSA by "trying lots of combination", it simply runs an algorithm for factorization that is impossible to run on a classical computer (Shor's algorithm)

    In your case there is presumably no mathematical problem to solve. What you have is akin to "one time pad crypto" which would be 100% secure if the key is longer than the message. The fact that you obviously have lots of data (much more than 128) means that it might still be possible to break but the attack would presumably be e.g. based on reducing the number of possibilities using statistics (which in turn would utilize knowledge about the nature of what is in the encrypted file, how e.g. JPEG files are saved) A QC would not be of any help here.
     
  14. Jul 5, 2018 #13
    Anyway.. in encryption and decryption of files such as using Axcrypt.. does the password say 8 character become encryption code? so it is just 8 bit instead of 128 or 256 bit? How does the password got store in the file.. why can't you extract it..

    How does file encryption generally work?
     
  15. Jul 6, 2018 #14
    Here's a link to an entertaining, and reasonably accurate, exposition of AES, which is what Axcrypt implements: http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
     
  16. Jul 6, 2018 #15

    Vanadium 50

    User Avatar
    Staff Emeritus
    Science Advisor
    Education Advisor
    2017 Award

    @dahoa, are you asking for help, or are you taking this as an opportunity to ask a bunch of random questions on encryption? People are writing answers assuming one, but it sounds like you want the other.
     
  17. Jul 6, 2018 #16
    The password is not stored in the file, that would defeat the entire purpose of encryption. The password is used to create a cipher text from you original plain text. The algorithms used are designed so that it is easy to recover the plain text from the cipher text if you know the key but very hard to to do if you don't know the key.
     
  18. Jul 9, 2018 #17
    Thank God.. I found the password written in old notebook.. password is "Sh&^zmW~aaTeER26&"

    Some of you said NSA can crack 128 key encryption.. Do they do it because they have faster computer? but how can they guess the above passwords even by inputting every dictionary words or combinations? Just want to know in case I or my friend forgot important passwords in the future..
     
  19. Jul 9, 2018 #18
    I imagine that's a big relief for you -- 17 characters, mixed case, numerals, special chars -- that's a very strong (hard to guess) passphrase -- in your OP, you said you thought of an object, and that is what led to the suggestions about dictionary attacks.

    Even with such a strong passphrase, the resources of the NSA are more than adequate to check every possible passphrase in a 17-printable-character ASCII space in a manageable timeframe -- that number is very much smaller than 2^128 -- even though 16 bytes, 8 bits each, is 128 bits, not all of those possibilities are in the ASCII space, i.e. some are not printable -- not counting the blank (ASCII 32), only 95 characters in the table (from 33 through 128) are printable. 2^95 is a very large number, but unlike us regular foks, NSA has computational capacity that can be measured in cubic acres.

    Publishing the password here obviously compromises the secrecy, but then again, it's presumably ordinarily private information -- like granny's secret recipes -- not national security top secret, and also presumably, we're not on a hunt for your M-Disc.

    Passwords or passphrases that are not readily memorizable, such as yours, are probably best kept in a backed-up digital password vault, with a password or passphrase that is easy enough for you to remember, and still too hard for an attacker to guess, and written down (or at least clued-for) and kept somewhere safe just in case.

    Glad to learn that you got your pictures back.
     
  20. Jul 9, 2018 #19
    I saved them again in m-disc without any passwords because they are just family pictures. For the 17 character password I used.. if you will try out every combination of them in brute force entry.. how do you compute how many combinations there are? What is the equation or formula? Just curious.
     
  21. Jul 10, 2018 #20

    Tom.G

    User Avatar
    Science Advisor

    Start with the number of possible unique characters. As @sysprog said, in your case that is 95.
    First position has 95 possible characters...
    Second position has 95 possible characters...
    So far that means there are 95×95 = 9025 possible 2-character passwords.

    If using a 3-character password there are 95×95×95 = 857,375 possibilities.

    The formula is {No. of possible Characters} raised to the power of the {No. of positions}. 9517 ≈ 4.18×1033 different possible passwords.

    4.18 decillion (American system)
    4.18 quintilliard (European system)
    4,180,000,000,000,000,000,000,000,000,000,000 (How long would it take you to count them, much less try them?)

    Cheers,
    Tom
     
Share this great discussion with others via Reddit, Google+, Twitter, or Facebook

Have something to add?
Draft saved Draft deleted