Skip to main content

Questions tagged [brute-force-attack]

A brute-force attack is attempting to find a secret value by trying all possible values until the correct one is found.

Filter by
Sorted by
Tagged with
4 votes
1 answer
259 views

Probability of success of password search under assumptions on the distribution

Adversaries got hold of a database of password hashes. They want to find the password for at least one of the hash. They'll try $k$ passwords on each of $h$ hashes. We assume they know enough about ...
fgrieu's user avatar
  • 150k
3 votes
2 answers
672 views

Is it possible to invert ChaCha20 rounds to recover an internal state of a specific round?

Can an adversary invert some rounds of ChaCha20 (or ChaCha12) to obtain the internal state of a specific round? I mean, if an adversary can invert 12 rounds of ChaCha20 to obtain the internal state of ...
przemyslawo's user avatar
0 votes
1 answer
71 views

Camellia ECB-mode chosen key for desired ciphertext/plaintext pair

I am wondering if it is possible to find a K that decrypts a chosen ciphertext C into a chosen plaintext P in Camellia 128 ECB-mode? We can assume that there is no IV. There will exist some K that ...
ucker's user avatar
  • 1
2 votes
0 answers
95 views

What's the current state of password bruteforcing ASICs in relation to memory hard key derivation functions?

Even though this sounds hardware related, it's essential to understand the actual security one obtains from memory hard key derivation functions, such as Balloon, as its strongest security guarantee ...
caveman's user avatar
  • 721
1 vote
1 answer
89 views

What does Balloon's theorem really mean?

Balloon's theorem says: Questions: Am I understanding the variables correctly? $n$ is number of blocks the user chooses. $r$ is number of rounds the user chooses. $\delta$ is number of pseudorandom ...
caveman's user avatar
  • 721
5 votes
4 answers
279 views

How does entropy measure the key strength?

I mean, in a pragmatic sense, in terms of a brute-force difficulty. For example, if I have a random key accumulating $N$ bits of entropy, I’d expect to brute-force it in the order of $2^N$ trials. It ...
uk-ny's user avatar
  • 187
2 votes
0 answers
59 views

Is there any quantum memory hard key derivation?

Current memory hard key derivation techniques rely on functions that allow for serialisation on tiny memory, except for requiring a quadratic time penalty. But, with Quantum's light-speed defying ...
caveman's user avatar
  • 721
2 votes
1 answer
175 views

7-Zip AES-256: The difference between hashing $2^{19}$ and $2^{24}$ times

Stock 7-Zip AES-256 encryption runs your password through a hash function 524,288 times ($2^{19}$). Source 1 Source 2 This is considered to be Not very good compared to a standard amount of Argon2 or ...
user125888's user avatar
2 votes
1 answer
87 views

Minimum number of length of sublist so that they have one element in common

I am aware that cross posting isn't typically allowed on SE but I think this question, earlier posted on math SE, is worth considering on crypto SE. (Since this post is just a copy of math SE question ...
esteregg's user avatar
0 votes
1 answer
117 views

Where can I find the implementation of the CRC-96 algorithm(ZIP)

At least his verbal description, as if I had searched the entire Internet, but I never found it. I want to try to crack the hash by brute force, and for this you need to have this algorithm at hand? I ...
Minislamov's user avatar
0 votes
0 answers
72 views

Is sha256 quantum secure? [duplicate]

I've been reading about the security implications of quantum computing on cryptographic algorithms and came across some discussions regarding SHA-256. I understand that SHA-256 is currently considered ...
Nerses Asaturyan's user avatar
0 votes
1 answer
97 views

Dumb question about brute force attacks

Let's assume that the password to be cracked is 15 characters long and consists of numbers (to keep the math simple). Let's assume the attacker has the following information about the password: It is ...
randomguy's user avatar
1 vote
1 answer
342 views

Brute force against DES

Let a plain text message M be DES encrypted with two different keys (K1 and K2) to produce ...
Jib's user avatar
  • 113
5 votes
1 answer
3k views

In Bitcoin, given half the 52-character private key in WIF format, is it possible to reconstruct the whole private key?

Given the following two preconditions: It is almost impossible to reconstruct a bitcoin private key if an attacker only has one half of the private key as well as the public key. It is almost ...
Ohumeronen's user avatar
-1 votes
1 answer
253 views

Given and encrypted message, is it theoretically possible to decrypt a message without the key or guessing it? If so, what methods could be used?

Decrypting an AES-Encrypted Message Without the Key: A Cryptographic Challenge Summary: I am investigating the possibility of decrypting an AES-encrypted message when the encryption key is unknown ...
NeoX's user avatar
  • 1

15 30 50 per page
1
2 3 4 5
24