[139603] in cryptography@c2.net mail archive
Re: AES HDD encryption was XOR
daemon@ATHENA.MIT.EDU (Jon Callas)
Tue Dec 9 11:01:06 2008
Cc: cryptography@metzdowd.com
From: Jon Callas <jon@callas.org>
To: William Allen Simpson <william.allen.simpson@gmail.com>
In-Reply-To: <493D5C08.5070005@gmail.com>
Date: Mon, 8 Dec 2008 20:53:18 -0800
>
>
> In the NBC TV episode of /Chuck/ a couple of weeks ago, the NSA
> cracked
> "a 512-bit AES cipher" on a flash drive "trying every possible key".
> "Could be hours, could be days." (Only minutes in TV land.)
>
> http://www.nbc.com/Chuck/video/episodes/#vid=838461
> (Chuck Versus The Fat Lady, 4th segment, at 26:19)
>
> It's no wonder that folks are deluded, pop culture reinforces this.
No, this is simple to do.
What you is to start with a basic cracking engine. And then you add
another one an hour later, and then an hour later add two, then add
four the next hour and so on.
If you assume that the first cracker can do 2^40 keys per second, then
you're guaranteed to complete in 472 hours, which is only 20 days. And
of course there's always the chance you'd do it in the first hour.
For those who doubt being able to double the cracking power, Moore's
law proves this is possible.
QED.
Jon
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com