[139603] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: AES HDD encryption was XOR

daemon@ATHENA.MIT.EDU (Jon Callas)
Tue Dec 9 11:01:06 2008

Cc: cryptography@metzdowd.com
From: Jon Callas <jon@callas.org>
To: William Allen Simpson <william.allen.simpson@gmail.com>
In-Reply-To: <493D5C08.5070005@gmail.com>
Date: Mon, 8 Dec 2008 20:53:18 -0800

>
>
> In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA  
> cracked
> "a 512-bit AES cipher" on a flash drive "trying every possible key".
> "Could be hours, could be days."  (Only minutes in TV land.)
>
> http://www.nbc.com/Chuck/video/episodes/#vid=838461
> (Chuck Versus The Fat Lady, 4th segment, at 26:19)
>
> It's no wonder that folks are deluded, pop culture reinforces this.

No, this is simple to do.

What you is to start with a basic cracking engine. And then you add  
another one an hour later, and then an hour later add two, then add  
four the next hour and so on.

If you assume that the first cracker can do 2^40 keys per second, then  
you're guaranteed to complete in 472 hours, which is only 20 days. And  
of course there's always the chance you'd do it in the first hour.

For those who doubt being able to double the cracking power, Moore's  
law proves this is possible.

QED.

	Jon

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post