A89: Re: Re: PR Hit -- Those bastards


[Prev][Next][Index][Thread]

A89: Re: Re: PR Hit -- Those bastards




I am pretty sure you are correct, as cracking was discussed previously on
the A89 list.  512bit encryption was the topic.

-Miles Raymond      EML: m_rayman@bigfoot.com
ICQ: 13217756       IRC: Killer2        AIM: KilIer2 (kilier2)
http://www.bigfoot.com/~m_rayman/

----- Original Message -----
From: <Vincent99@aol.com>
To: <assembly-89@lists.ticalc.org>
Sent: Wednesday, December 01, 1999 9:23 PM
Subject: A89: Re: PR Hit -- Those bastards

> >as for the 512 bit key thingy, what we're saying is that we may get
lucky.
> >What if the code is the first one we try?  Statistics are nice, but flip
a
> >coin twice.  Odds are you'll get it heads or tails both times:P  Who
knows,
> >it may be something stupid like on spaceballs (1...2...3...4...5) :P
>
> Okay, pick a random sequence of 512 heads and tails, then flip 512 coins
and
> see if you get that same sequence.  Like I said, it's like locating out a
> specific Iron atom out that's somewhere in the universe.
>
> I've seen 256-bit mentioned several times today so maybe it's a 256-bit,
but
> that is just as rediculous in practicality to crack. (1.84E60 years for
the
> entire keyspace with 1000 computers doing 2 million keys/sec).  RC5-56
took
> distributed.net 250 days to crack, and that is a much smaller keyspace
with
> much more computing power.
>
> OTOH, if every one of the 1000 people who theoretically participate in
> cracking the code contributed a dollar to a fund, the resulting $1k would
> make a nice "gift" to a TI employee who knows the key.
>
> --Vincent



References: