General brute force attack question
Robert J. Hansen
rjh at sixdemonbag.org
Wed Jun 17 01:45:57 CEST 2015
> Is this a correct interpretation?
Pretty close.
> My understanding of en-/decryption is that there is no indication of
> progress toward finding a successful key match of a given
> encryption.
Not quite. If you're doing a brute-force attack it's easy to figure out
what fraction of the possible number of keys you've tried, and to
present that as a progress bar -- when the progress bar is half done,
you've searched half the possible keys, and thus there's a 50% chance of
finding the key by then. So yes, it's possible to come up with a pretty
good estimate of how long it'll take to brute-force a cipher, and that
lets you do things like status bars... it's just that the amount of time
is, for any good system, ludicrously big.
> Related to this is the oft-repeated request to avoid identifiable
> information (initials, birth date, etc.) in a cryptographic key. I
> presume this gives an attacker a preferred set of characters to
> attempt before moving on to truly random combinations.
Called "cribs", yes. Even then, this is rarely used in the key itself.
Usually it's used as the input to a key derivation function, which
accepts something nice and English-like as input and yields a garbled
mess for output.
> Finally, a brute force attack requires potentially billions of
> attempts.
Add *many* more zeroes on to this. :)
> How does an attacker then perform a brute force attack? Does he cadge
> a block of encrypted text and hammer on that until success?
Without getting into high levels of detail, all I can say is "it will
vary from system to system."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20150616/accc9a17/attachment.sig>
More information about the Gnupg-users
mailing list