Home |
Search |
Today's Posts |
#19
![]() |
|||
|
|||
![]()
In article ,
Mark wrote: I wouldn't want to sell you on anything..... as I really don't care what you think..... Obviously you do. I am just stating the facts of the case at hand..... Your mileage may vary...... but the facts of the case don't change just because you seem to have a different opinion....... 50 cpu's are readily available in most highschool computerlabs, and can be crunching away on such problems 12 hours a day, and full time on weekends....... this isn't "Rocket Science", it is just distributive computing, which has been around for 10 years....... I take it you have never dealt with digital vioce communications hardware, and keyloaders that set and load the keys into those systems......if you had such experience, you would know normal keylengths, and encryption systems that they use....... As a salesman, you need to convince people how you have such a vast world of experience in voice encryption, yet are either a high school student or work in the computer lab at a high school....... As you claim that distributed computing has been around for so long, you should then also know that there are plenty of FREE web resources that allow you to share cpu cycles from computers all over the world of people who feel like contributing their unused cpu cycles to any one of a million causes. Have fun. I am only more convinced that you've cracked no such thing. The horse is dead, I'm done beating it. No, I just have a lot more communications experience than you do. I graduated from High School long before there were computers, let alone conputerlabs in them. I am retired, and have been a Federal Agent, and worked for the Feds in a communications technical advisory position. Like I stated before, this isn't "Rocket Science", and these things have all been done before. It doesn't require any new knowledge base, it just requires an understanding of the system and a bit of computing power. Mac G5 Dual 2.5Ghz boxes have enough computing power to do this type of bruteforce cruching all by themselves. Yea, it would take a month or two but that is not unreasonable, considering that it is a desktop machine and running 2.0Gflop+.....and that assumes that the key is found in the last half of the iteration and not the first half. That is a 50/50 proposition, in bruteforce key cracking. Also with some knowledge of the guy who setup the key, one could reduce the job significantly, because most of these guys aren't crypies and they don't pick totally random keys seeds, which reduces the problem by a few orders of magnitude. Me |
Thread Tools | Search this Thread |
Display Modes | |
|
|
![]() |
||||
Thread | Forum | |||
Radio call letters: What do they mean? | Broadcasting | |||
For sale: Partial interest in LPTV. East coast beach resort city. | Broadcasting | |||
Who peed in the pool? | Policy | |||
For sale: Partial interest in AM daytimer in small Alabama city. | Broadcasting | |||
Needed : and Australian and NZ equivalants of the VOACAP city database for Finland. | Shortwave |