rsa
RSA is one of those mathematical methods as you know.
Check here
www.rsasecurity.com/stand...asics.html
...and check out the heading
What's the difference between a 40-bit SSL connection and a 128-bit SSL connection?
Regards
Steve
- Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
- Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
Collapse
You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:
- You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
- You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
- If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.
Logging in...
Previously on "High security encryption - is it necessary much of the time?"
Collapse
-
Guest replied
-
Guest repliedcrypto
My reckoning is that when you get high security algo's then the people who are going to try to crack them will be 'of the same order'. It's at that point that it becomes a game between the two of them, getting ever more complicated.
If you buy a BMW with a state of the art theft device, they will find a way to steal your BMW and many more like it.
But if you build a personally constructed switch to break the ignition circuit then the thieves will not even think about looking for it.
I would suggest that the same applies to encryption.
But watch out that there are crappy thieves who will look for your circuit breaker as there are crackers that will do the normal dictionary and other 'obvious' methods.
As soon as you make things available then the crackers can get their hands on lots information that works - and they will work it back to the initial passwords.
Think of it like this :: 5000 passwords and login names to study - perhaps 4500 of those passwords are meaningless crap like ghsg6548sd65vs, but if 500 of them are dictionary words then they can have a go of figuring the algo that changed them.
And they will figure it.
Unless it's way over their head.
So it's best to use all sorts of tulipe.
I only got half way through my crypto module but have been thinking about studying the rest of it recently, the more bits the more possibilities the longer it's gong to take the computer to mak even a single calculation.
That's what half of it is about these days is getting to the stage where it would take the fastest computer longer than the history of the universe to "try those possibilities".
If it's just to stop your 19 yr old pinching your porn, then something simple like ASCII codes * the dogs name will do.
Steve.
Leave a comment:
-
Guest replied'fraid so.
algebraic field theory lies behind most decent encryption algos and they are very good. that and prime factorisation keys....
Leave a comment:
-
Guest started a topic High security encryption - is it necessary much of the time?High security encryption - is it necessary much of the time?
Not a work related post - just curious.
You can get all sorts of little programs boasting some amazing algorithm, 96 billion bit encryption, just for keeping your passwords, pin numbers etc.safe.
Is it actually necessary? Surely decryption requires some sort of pattern to the content to work?. If you have a file containing pins/passwords that are just completely meaningless combinations of numbers and letters, and they have been translated into a different combination of meaningless numbers and letters, is there any decryption process that could possibly be quicker than just trying all the combinations?
Strikes me that you could apply some really simple encryption algorithm to such a file and it would effectively be as secure as the pro offerings. Or is that complete rubbish?Tags: None
- Home
- News & Features
- First Timers
- IR35 / S660 / BN66
- Employee Benefit Trusts
- Agency Workers Regulations
- MSC Legislation
- Limited Companies
- Dividends
- Umbrella Company
- VAT / Flat Rate VAT
- Job News & Guides
- Money News & Guides
- Guide to Contracts
- Successful Contracting
- Contracting Overseas
- Contractor Calculators
- MVL
- Contractor Expenses
Advertisers
Contractor Services
CUK News
- Streamline Your Retirement with iSIPP: A Solution for Contractor Pensions Sep 1 09:13
- Making the most of pension lump sums: overview for contractors Sep 1 08:36
- Umbrella company tribunal cases are opening up; are your wages subject to unlawful deductions, too? Aug 31 08:38
- Contractors, relabelling 'labour' as 'services' to appear 'fully contracted out' won't dupe IR35 inspectors Aug 31 08:30
- How often does HMRC check tax returns? Aug 30 08:27
- Work-life balance as an IT contractor: 5 top tips from a tech recruiter Aug 30 08:20
- Autumn Statement 2023 tipped to prioritise mental health, in a boost for UK workplaces Aug 29 08:33
- Final reminder for contractors to respond to the umbrella consultation (closing today) Aug 29 08:09
- Top 5 most in demand cyber security contract roles Aug 25 08:38
- Changes to the right to request flexible working are incoming, but how will contractors be affected? Aug 24 08:25
Leave a comment: