YHBW.

Jan. 26th, 2010 11:22 pm
maradydd: (money)
[personal profile] maradydd
Observation just now from Radu Sion during the FC rump session: in the cloud, it costs about $5 million to brute-force 64 bits of symmetric key.

(no subject)

Date: 2010-01-27 08:43 pm (UTC)
From: [identity profile] docstrange.livejournal.com
Given a crypto algo without known weaknesses, it should double per extra bit, no?

(no subject)

Date: 2010-01-27 08:43 pm (UTC)
From: [identity profile] docstrange.livejournal.com
(And given we're talking brute force, the weakness isn't relevant to the measurement...)

(no subject)

Date: 2010-01-27 09:05 pm (UTC)
From: [identity profile] jrtom.livejournal.com
That's what I'd expect, yes. But what I expect is not always what is true, so it's good to have data that confirm (or deny) my understanding. Also, I'm not a cryptanalyst, so I don't know whether there are any nuances to the "double per extra bit" rule of thumb.

(no subject)

Date: 2010-01-28 01:58 pm (UTC)
vatine: Generated with some CL code and a hand-designed blackletter font (Default)
From: [personal profile] vatine
I think the right answer is "roughly". It depends on how much the extra key space influences the actual encryption. A typical example would be 3DES, with triple the number of key bits, for squaring the amount of effort to brute-force (as to exactly why that is, ask a cryptographer, I can sorta see it but not explain it).

Profile

maradydd: (Default)
maradydd

September 2010

S M T W T F S
   1234
567891011
12131415 161718
19202122232425
26 27282930  

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags