gva
- 50
- 1
I got a freeware encryption software with only 128 bit. How fast it is for hackers to crack 128 bit file encryption?
Greg Bernhardt said:A long time
http://www.inet2000.com/public/encryption.htm
Passwords and the encryption standard (128 bit in this case) have nothing to do with each other. The encryption is done exactly the same way whether you have a 3 character password or a 300 character password.gva said:But in file encryption software, it seems related to the password. For example I just use a 5 letter password.. how's the password related to the 128 bit encryption
phinds said:Passwords and the encryption standard (128 bit in this case) have nothing to do with each other. The encryption is done exactly the same way whether you have a 3 character password or a 300 character password.
Hacking an encryption means bypassing the password completely.
Of course, if you use a simple password, then they don't HAVE to crack the encryption, they just figure out your password and then they are in regardless of the encryption being used.
Greg Bernhardt said:A long time
http://www.inet2000.com/public/encryption.htm
It's a private key. It is not transmitted. There is a public key for use in ENcrypting things but only the private key will DEcrypt.GTOM said:What prevents intercepting the key itself?
Jim, according to what I have read, if computers get 1,000,000 times faster than they are today it would still take longer than the current age of the universe to brute force hack a 128 bit codejim mcnamara said:@gva 128 AES is breakable but is still actively used in the ssh 2 protocol. Why? Because nobody is going to spend a week of supercomputer time cracking your email.
phinds said:Jim, according to what I have read, if computers get 1,000,000 times faster than they are today it would still take longer than the current age of the universe to brute force hack a 128 bit code
phinds said:It's a private key. It is not transmitted. There is a public key for use in ENcrypting things but only the private key will DEcrypt.
No, it is simply a statement of fact about brute force hacking. It makes no assumptions at all and has nothing to do with other methods.GTOM said:That of course, assumes that brute force is the only way.