Each group of six digits must be divisible by 11, which is used as a check against keys mistyped by the user when entering the groups.Įach of the 8 groups of 6 digits must be less than 720,896 (which is 2^16 *11) indicating that each of the eight groups has 2^16 possible values, and altogether this means that there are (2^16)^8 possible combinations which is ~3.4028 x 10^38 combinations.Īssuming we could somehow process 500 trillion passwords an hour (which would be 3,623 times more than the ~138 billion passwords per hour capability of a desktop computer in 2008 under 10% load), it would still take us ~7.7 x 10^19 years to brute force crack this 48 character numerical recovery password. The recovery password is created starting with a 128-bit key, split into 8 groups of 16 bits of entropy, written as a value between 0 and 65,535 (2^16 - 1). ![]() ![]() I've done some further analysis, and I believe I have determined that brute force attacking the recovery password would not be a good use of anyone's time.that is assuming my math is correct.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |