View Single Post
  #19   Report Post  
Old April 1st 05, 07:09 PM
Me
 
Posts: n/a
Default

In article ,
Mark wrote:

I wouldn't want to sell you on anything..... as I really don't care what
you think.....


Obviously you do.

I am just stating the facts of the case at hand.....
Your mileage may vary...... but the facts of the case don't change just
because you seem to have a different opinion....... 50 cpu's are
readily available in most highschool computerlabs, and can be crunching
away on such problems 12 hours a day, and full time on weekends.......
this isn't "Rocket Science", it is just distributive computing, which
has been around for 10 years....... I take it you have never dealt with
digital vioce communications hardware, and keyloaders that set and load
the keys into those systems......if you had such experience, you would
know normal keylengths, and encryption systems that they use.......


As a salesman, you need to convince people how you have such a vast world of
experience in voice encryption, yet are either a high school student or work
in the computer lab at a high school.......

As you claim that distributed computing has been around for so long, you
should then also know that there are plenty of FREE web resources that allow
you to share cpu cycles from computers all over the world of people who feel
like contributing their unused cpu cycles to any one of a million causes.

Have fun. I am only more convinced that you've cracked no such thing. The
horse is dead, I'm done beating it.


No, I just have a lot more communications experience than you do. I
graduated from High School long before there were computers, let alone
conputerlabs in them. I am retired, and have been a Federal Agent, and
worked for the Feds in a communications technical advisory position.
Like I stated before, this isn't "Rocket Science", and these things have
all been done before. It doesn't require any new knowledge base, it
just requires an understanding of the system and a bit of computing
power. Mac G5 Dual 2.5Ghz boxes have enough computing power to do this
type of bruteforce cruching all by themselves. Yea, it would take a month
or two but that is not unreasonable, considering that it is a desktop
machine and running 2.0Gflop+.....and that assumes that the key is found
in the last half of the iteration and not the first half. That is a
50/50 proposition, in bruteforce key cracking. Also with some knowledge
of the guy who setup the key, one could reduce the job significantly,
because most of these guys aren't crypies and they don't pick totally
random keys seeds, which reduces the problem by a few orders of
magnitude.

Me