Truecrypt recovery service in India

Discussion in 'privacy technology' started by mysticav, Feb 11, 2010.

Thread Status:
Not open for further replies.
  1. dantz

    dantz Registered Member

    Joined:
    Jan 19, 2007
    Posts:
    1,034
    Location:
    Hawaii
    I'm beginning to think that maybe we've all been scammed by mysticav, as his story doesn't really sound that believable.
     
  2. wat0114

    wat0114 Guest

    Indeed, you may be right.
     
  3. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    EDIT:

    I mistakenly calculated the entropy of a 20 charcter password as 20^94 when it should have been 94^20 (a much smaller number). However, as you can see, it doesn't make a whole lot of practical difference. The password is still not brute-forceable.


    No. A brute force would be hopeless against that. That password has 131 bits of entropy in it. Therefore, it would take longer to brute force it than it would take to brute force AES 128.

    Since there are 94 possibilities per character of the password and the password is 20 characters long, this equates to:

    Code:
    94^20 = 2.90106241131461823373e39
    The number of inches of land on the earth's surface is:

    Code:
    1.96 x 10^17
    Now, everyone knows that GPU's are much faster at this sort of cracking than are typical x86 CPU's. According to a chart at elcomsoft, which specializes in this sort of cracking for a fee, an Nvidia Tesla GPU can calculate about 2,000,000,000 passwords per second when using MD5 hash.

    Let's say that we can theoretically put one Tesla GPU on every square inch of the earth's land surface. This would mean:
    Code:
    1.96 x 10^17 GPU's X 2,000,000,000 passwords per second = [B]3.92e26[/B] passwords per second.
    That means Tesla GPU's spanning every inch of the earth's surface can calculate 3.92 x 10^26 passwords per second. That is 26 zeroes. Now, we know that there are 31,556,926 seconds in one year. So, the calculation is easy:

    Code:
    3.92e26 X 31,556,926 = 1.2370314992e34 passwords per year.
    Now all we have to do is take the total number of possibilities in the password (2.90106241131461823373e39) and divide it by how many passwords can be crunched per year. Therefore:

    Code:
    2.90106241131461823373e39 / 1.2370314992e34 = 234,518 years
    It would take 234,518 years for GPU's spanning every inch of the earth's surface to exhaust every possibility in your password. 234,518 is the amount of time it would take for there to be 100% certainty the password was found. However, there is obviously a 50% chance it will be found in half that time (~115,000 years).
     
    Last edited: Mar 19, 2010
  4. dw426

    dw426 Registered Member

    Joined:
    Jan 3, 2007
    Posts:
    5,543
    Lol, well, NASA does quite a bit more than just send robots to planets and take pretty pictures, but yeah, this should have been thought out a hell of a lot more than it was.
     
  5. dw426

    dw426 Registered Member

    Joined:
    Jan 3, 2007
    Posts:
    5,543
    Chrono, thanks to you I'm now going to need 1 octovigintillion aspirin tablets to kill the headache that just gave me. So in other words, considering humans only have about 3-5 billion years left to live (depending on if the Andromeda galaxy collides with the Milky Way first, causing who knows what to happen, or the Sun becomes a red giant, boiling the Earth alive)...no one is getting that password :D
     
  6. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    That's correct. They ain't gonna get it via brute force, period.

    However, suppose the guy generated his seemingly random password with a weak random number generator. In theory if the adversary was able to crack that RNG he could speed up his brute force substantially. But this is true for encryption keys as well. If the RNG is cracked, the keys probably wont hold up for very long even though the cipher itself is strong.

    Let's say you take 20 Monkeys and have them each type out a random password on a keyboard, and then randomly pick and choose one character from each monkey. This should give an essentially random 20 character password. So, if the password is truly random, then my above calculations hold true.
     
  7. dantz

    dantz Registered Member

    Joined:
    Jan 19, 2007
    Posts:
    1,034
    Location:
    Hawaii
    Nicely written. I was going to check your calculations, but then I realized that I don't even know what an octovigintillion is. I think I'll just believe you.

    But why must we wait so long? The obvious solution would be to build a time machine, go to the future, pick up the results and bring them back.
     
  8. dw426

    dw426 Registered Member

    Joined:
    Jan 3, 2007
    Posts:
    5,543
    I'll run down the street and get my bud to let me borrow his Delorean, you scamper off and grab the 1.21 gigawatt reactor, and I'll meet you outside my place in half an hour. We'll grab a bite to eat on the way :D
     
  9. hierophant

    hierophant Registered Member

    Joined:
    Dec 18, 2009
    Posts:
    854
    I highly recommend "Primer" -- an insanely complex time travel film.
     
  10. chronomatic

    chronomatic Registered Member

    Joined:
    Apr 9, 2009
    Posts:
    1,343
    Yeah, I watched that on Netflix a couple months ago. Not bad for a B title.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.