Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
A red alert about Sephforum.
#31
any code should be 2-way if you know the key, and it encrypts the same way every time. Smile
i]"I know what you're thinking. Did he fire six shots or only five? Well, to tell you the truth, in all this excitement, I've kinda lost track myself. But being as this is a .44 Magnum ... you've got to ask yourself one question: 'Do I feel lucky?' Well, do ya punk?"[/i] - Dirty Harry
Reply
#32
IMO a determined hacker would be able to break any implemented encryption. Its just a matter of *time*.

Oh yeah,
Zack, stop overreacting. You should've contacted Seph privately instead of telling everyone about it on a public forum =P.
Reply
#33
I'm calm now.
For a 7-character password, yeah, it is a matter of time: about 10 years.
f only life let you press CTRL-Z.
--------------------------------------
Freebasic is like QB, except it doesn't suck.
Reply
#34
Yeah by then you would've changed your password atleast 10 times? I know I would =D
Reply
#35
If you have the formula for the encryption, a dedicated hacker could get it in a much shorter matter of time. MD5 is about as good as any encryption if you're just guessing and testing..
i]"I know what you're thinking. Did he fire six shots or only five? Well, to tell you the truth, in all this excitement, I've kinda lost track myself. But being as this is a .44 Magnum ... you've got to ask yourself one question: 'Do I feel lucky?' Well, do ya punk?"[/i] - Dirty Harry
Reply
#36
Quote:If you have the formula for the encryption, a dedicated hacker could get it in a much shorter matter of time. MD5 is about as good as any encryption if you're just guessing and testing..

The 'much shorter matter of time' isn't too much of a concern with good available encryption schemes. Highly secure encryption schemes can take powerful supercomputers or clusters several years to break, so even if knowing the algorithm allowed you to cut that time in half, breaking the encryption would most probably still be unfeasible.

Quote:any code should be 2-way if you know the key, and it encrypts the same way every time.

AFAIK all encyption systems are two way, however one way is significantly more difficult mathmatically than the other. For example multiplying two large primes together to get a number is computationaly easy, finding out what the prime factors of a number are is computationally difficult. Knowing the key doesn't always guarantee that you can decrypt anything either, for example public/private key encryption systems.
esus saves.... Passes to Moses, shoots, he scores!
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)