Jump to content

  • Log In with Google      Sign In   
  • Create Account


#ActualKnolanCross

Posted 04 January 2013 - 03:54 PM

Even at that speed he would still take 2 years to calculate all the possible hashs. The main point of any cryptography search space is that it grows exponentially, while the attacker's power grows linearly.

 

Still, assuming he can "break" the hash by bruteforce in some fast way, he will only find the random number operated with the password, not the password itself (which is useless).


#2KnolanCross

Posted 04 January 2013 - 03:54 PM

Even at that speed he would still take 2 years to calculate all the possible hashs. The main point of any cryptography search space is that it grows exponentially, while the attacker's power grows linearly.

 

Still, assuming he can "break" the hash by bruteforce in some fast way, he will only achiev the random number operated with the password, not the password itself (which is useless).


#1KnolanCross

Posted 04 January 2013 - 03:51 PM

Even at that speed he would still take 2 years to calculate all the possible hashs.

 

And assuming he can "break" the hash by bruteforce in some fast way, he will only achiev the random number operated with the password, not the password itself.


PARTNERS