A89: Re: Re: PR Hit -- Those bastards
[Prev][Next][Index][Thread]
A89: Re: Re: PR Hit -- Those bastards
I am pretty sure you are correct, as cracking was discussed previously on
the A89 list. 512bit encryption was the topic.
-Miles Raymond EML: m_rayman@bigfoot.com
ICQ: 13217756 IRC: Killer2 AIM: KilIer2 (kilier2)
http://www.bigfoot.com/~m_rayman/
----- Original Message -----
From: <Vincent99@aol.com>
To: <assembly-89@lists.ticalc.org>
Sent: Wednesday, December 01, 1999 9:23 PM
Subject: A89: Re: PR Hit -- Those bastards
> >as for the 512 bit key thingy, what we're saying is that we may get
lucky.
> >What if the code is the first one we try? Statistics are nice, but flip
a
> >coin twice. Odds are you'll get it heads or tails both times:P Who
knows,
> >it may be something stupid like on spaceballs (1...2...3...4...5) :P
>
> Okay, pick a random sequence of 512 heads and tails, then flip 512 coins
and
> see if you get that same sequence. Like I said, it's like locating out a
> specific Iron atom out that's somewhere in the universe.
>
> I've seen 256-bit mentioned several times today so maybe it's a 256-bit,
but
> that is just as rediculous in practicality to crack. (1.84E60 years for
the
> entire keyspace with 1000 computers doing 2 million keys/sec). RC5-56
took
> distributed.net 250 days to crack, and that is a much smaller keyspace
with
> much more computing power.
>
> OTOH, if every one of the 1000 people who theoretically participate in
> cracking the code contributed a dollar to a fund, the resulting $1k would
> make a nice "gift" to a TI employee who knows the key.
>
> --Vincent
References: