In article ,
Mark wrote:
On Wed, 30 Mar 2005 17:39:33 GMT, Me wrote:
very few voice encryption systems use more than a 128 bit key.
On what planet? I agree that 4096 may be a tad off, but 128 most certainly is
as well.
with
bruteforce attack a 128 bit key is certainly doable with a 50 cpu
distributed attack. should take about two weeks......
Me been there, done that.......
I seriously doubt you have access to 50 cpu's for a two week period and have
cracked any type of digital voice encryption ever. As a matter of fact, I'm
telling you that you're full of it.
But, if you are a good enough salesman, perhaps you'll convince some.
I wouldn't want to sell you on anything..... as I really don't care what
you think..... I am just stating the facts of the case at hand.....
Your mileage may vary...... but the facts of the case don't change just
because you seem to have a different opinion....... 50 cpu's are
readily available in most highschool computerlabs, and can be crunching
away on such problems 12 hours a day, and full time on weekends.......
this isn't "Rocket Science", it is just distributive computing, which
has been around for 10 years....... I take it you have never dealt with
digital vioce communications hardware, and keyloaders that set and load
the keys into those systems......if you had such experience, you would
know normal keylengths, and encryption systems that they use.......
Me
|