Jump to content

Moore's Law and us


Recommended Posts


When it comes to network/account/computer security the inescapable conclusion is that most of us are ultimately protected by nothing more than the "security of the herd" - there are just too many of us to be eaten by the predators in one sitting (and, hopefully, not before most of us can breed - I've done my bit :D ). Whatever other mainstream defences we might rely upon can be overtaken at any time by the evolving capabilities of the ungodly.

Such musing comes about when reviewing the links offered up by member ChrisK in a post in newsgoup g.security at news.grc.com:



OK, not a DIRECT attack, simply a demonstration that a brute force approach to reveal a good Windows password given just its (unsecured) hash value (and, ideally for the hacker, knowing/guessing its length and character set - upper-lower alpha, numerals, special characters) can be achieved in less than the life of the universe using a cheap graphics card for the processing power these days. But, it's a very sound basis for actual bastadry. The same way as the demonstration of "collisions" in a hash generator (two different strings giving the same hash value) will reveal a "chink in the armour". A different kind of chink, to be sure (collision is a higher-level matter entirely), but any weakness is theoretically exploitable. And yes, of course, this kind of processing power can be used to probe for hash-generator collisions too.

What, me worry? Noooo ...

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


  • Create New...