What is the reliability of this password creation method?

  • Thread starter Thread starter Gomar
  • Start date Start date
Click For Summary
The discussion centers around the time it would take to crack a 20-character password composed solely of lowercase letters. Calculations suggest that at a cracking speed of 1 trillion passwords per second, it would take approximately 659 million years to exhaust all combinations. Even at a higher speed of 100 trillion passwords per second, the time required remains extensive, estimated at over 6 million years. The conversation highlights that while brute-force attacks are theoretically feasible, practical cracking methods often prioritize more likely combinations, which could significantly reduce the time needed if the password is simple or common. The importance of using complex passwords is emphasized to enhance security against potential breaches.
Gomar
Messages
21
Reaction score
0
https://www.grc.com/haystack.htm

enter a random 20 character pw made of only lower case letters.
(However, x100 as I am using 1T not 100T pws/sec; thus:
65.90 thousand centuries x100 = 6590 thousand centuries)

answer: 659,000,000years.

is that correct?
 
Computer science news on Phys.org
Gomar said:
https://www.grc.com/haystack.htm

enter a random 20 character pw made of only lower case letters.
(However, x100 as I am using 1T not 100T pws/sec; thus:
65.90 thousand centuries x100 = 6590 thousand centuries)

answer: 659,000,000years.

is that correct?
I guess, if I understand what you're asking. 65,900 X 100 centuries = 6,590,000 centuries = 659,000,000 years

Note: I didn't visit the site you showed, so I don't know what your question has to do with anything.
 
20725274851017785518433805270 looks about right ...

at 1 Tpws/s ... maybe 656,744,329.448937 yrs is a slightly better rough guess?

20725274851017785518433805270 / 1 T / (60 * 60 * 24 * 365.25)
 
NemoReally said:
20725274851017785518433805270 looks about right ...

at 1 Tpws/s ... maybe 656,744,329.448937 yrs is a slightly better rough guess?

20725274851017785518433805270 / 1 T / (60 * 60 * 24 * 365.25)


Thanks for atleast visiting the site prior to posting an answer.
Yes, you are correct. Even using 100T pws/sec (their speed), I could rest assured spooks won't break my encrypted files in atleast 6m years even if using only lower case letters.
 
Gomar said:
Thanks for atleast visiting the site prior to posting an answer.
Yes, you are correct. Even using 100T pws/sec (their speed), I could rest assured spooks won't break my encrypted files in atleast 6m years even if using only lower case letters.

Ah, well, I think the site does mention (I only glanced at it) that a cracking algorithm would try certain combinations first as being more likely (people have to remember them and many password generating algorithms have a filter that restricts the passwords to "human memorable / speakable" passwords). The time given is that needed to test all the combinations. If the cracking algorithm just rolls its sleeves up, starts at "aaaaa..." and your password happens to be "aaaaa..." then your secret stash of pi porn will become viral in no time (well, at least in the maths community :cool:)
 
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...

Similar threads

  • · Replies 3 ·
Replies
3
Views
3K
Replies
4
Views
4K
  • · Replies 94 ·
4
Replies
94
Views
12K
  • · Replies 1 ·
Replies
1
Views
3K
  • · Replies 11 ·
Replies
11
Views
28K