Questions tagged [brute-force-attack]
A brute-force attack is attempting to find a secret value by trying all possible values until the correct one is found.
356 questions
4
votes
1
answer
259
views
Probability of success of password search under assumptions on the distribution
Adversaries got hold of a database of password hashes. They want to find the password for at least one of the hash. They'll try $k$ passwords on each of $h$ hashes. We assume they know enough about ...
3
votes
2
answers
672
views
Is it possible to invert ChaCha20 rounds to recover an internal state of a specific round?
Can an adversary invert some rounds of ChaCha20 (or ChaCha12) to obtain the internal state of a specific round?
I mean, if an adversary can invert 12 rounds of ChaCha20 to obtain the internal state of ...
0
votes
1
answer
71
views
Camellia ECB-mode chosen key for desired ciphertext/plaintext pair
I am wondering if it is possible to find a K that decrypts a chosen ciphertext C into a chosen plaintext P in Camellia 128 ECB-mode? We can assume that there is no IV. There will exist some K that ...
2
votes
0
answers
95
views
What's the current state of password bruteforcing ASICs in relation to memory hard key derivation functions?
Even though this sounds hardware related, it's essential to understand the actual security one obtains from memory hard key derivation functions, such as Balloon, as its strongest security guarantee ...
1
vote
1
answer
89
views
What does Balloon's theorem really mean?
Balloon's theorem says:
Questions:
Am I understanding the variables correctly?
$n$ is number of blocks the user chooses.
$r$ is number of rounds the user chooses.
$\delta$ is number of pseudorandom ...
5
votes
4
answers
279
views
How does entropy measure the key strength?
I mean, in a pragmatic sense, in terms of a brute-force difficulty.
For example, if I have a random key accumulating $N$ bits of entropy, I’d expect to brute-force it in the order of $2^N$ trials.
It ...
2
votes
0
answers
59
views
Is there any quantum memory hard key derivation?
Current memory hard key derivation techniques rely on functions that allow for serialisation on tiny memory, except for requiring a quadratic time penalty.
But, with Quantum's light-speed defying ...
2
votes
1
answer
175
views
7-Zip AES-256: The difference between hashing $2^{19}$ and $2^{24}$ times
Stock 7-Zip AES-256 encryption runs your password through a hash function 524,288 times ($2^{19}$).
Source 1
Source 2
This is considered to be
Not very good compared to a standard amount of Argon2 or ...
2
votes
1
answer
87
views
Minimum number of length of sublist so that they have one element in common
I am aware that cross posting isn't typically allowed on SE but I think this question, earlier posted on math SE, is worth considering on crypto SE.
(Since this post is just a copy of math SE question ...
0
votes
1
answer
117
views
Where can I find the implementation of the CRC-96 algorithm(ZIP)
At least his verbal description, as if I had searched the entire Internet, but I never found it. I want to try to crack the hash by brute force, and for this you need to have this algorithm at hand? I ...
0
votes
0
answers
72
views
Is sha256 quantum secure? [duplicate]
I've been reading about the security implications of quantum computing on cryptographic algorithms and came across some discussions regarding SHA-256. I understand that SHA-256 is currently considered ...
0
votes
1
answer
97
views
Dumb question about brute force attacks
Let's assume that the password to be cracked is 15 characters long and consists of numbers (to keep the math simple). Let's assume the attacker has the following information about the password:
It is ...
1
vote
1
answer
342
views
Brute force against DES
Let a plain text message M be DES encrypted with two different keys (K1 and K2) to produce ...
5
votes
1
answer
3k
views
In Bitcoin, given half the 52-character private key in WIF format, is it possible to reconstruct the whole private key?
Given the following two preconditions:
It is almost impossible to reconstruct a bitcoin private key if an attacker only has one half of the private key as well as the public key.
It is almost ...
-1
votes
1
answer
253
views
Given and encrypted message, is it theoretically possible to decrypt a message without the key or guessing it? If so, what methods could be used?
Decrypting an AES-Encrypted Message Without the Key: A Cryptographic Challenge
Summary:
I am investigating the possibility of decrypting an AES-encrypted message when the encryption key is unknown ...