Visual Posted September 27, 2013 Author Share Posted September 27, 2013 (edited) Well, tell your tech geek that I believe it because I know how it works. :-) I'm not talking about encryption, which is the conversion of plain text into an encrypted form that is meant to be recovered; I'm talking about cryptographic hashing, which is the replacement of one dataset with another completely- a dataset that represents the original but cannot be converted back to the original. With SHA-3, currently the strongest cryptographic hashing (or "message digest") algorithm, you can have an example of the hashing process and even know how it works and still not be able to reverse-engineer the original from the hash. Each character inserted into the hash changes its value dramatically. For instance, this is the hash of my name as it is rendered on this forum, "david.atwell": 813f3630a40bad7abc2b21442781d28efdf9723098992f6e16e80466193597e7 If I capitalize just one letter (sending "david.Atwell"), it instead renders as: cc5eeba35e7ca65ad5c59650a1f556d389f4c30d2889a3e643afa11dd6093f6d As you can see, it isn't just the first few characters that change, but ALL of the characters. And if I double the length: cf69d14c4eceeab3b039531b6335eced1e47d8612ae94b305536ece4e2cae4b2 notice that the hashed message stays the exact same length. And therein lies one of the greatest strengths of the hash: you not only can't tell what the message is with a hash, you can't tell how long it is or even what kind of characters it's made of. As of right now, the only way to take the first hash and recover my name from it is to start with the character null, hash it with this method, then compare the results with the hash you have. Then try it with the character "1", then "2" and so on. Once you've reached the last of the 1,112,064 characters in UTF-8 and still haven't discovered the correct message that leads to that hash, start over with null null, then null 1, and so on. Continue until you've matched the original message. This is called a brute-force attack, and if a computer were looking for a 12-character message (my name) using only A-Z, numbers, and minor punctuation (just one sixteen-thousandth of the full UTF-8 character space) it would take almost 2,218,434,939 (2 BILLION) YEARS for the computer to get through all the combinations. If you break my password 2 billion years from now, I honestly don't care. :-) If you break my password 2 billion years from now, I honestly don't care. :-) He says they used to tell the public that it would take 300 yrs to defeat wpa. They do it in hours now. He says a group already has readymade tools that are working around the clock on something called Backtrack. He says they will probably find another way to defeat it, the same thing happend with WPA encryption. They found a flaw for something about WPS? and can hack it fairly fast. It would be better to not place so much faith on anything. You guys really impress me with your knowledge. It looks like chinese to me. Maybe that's why my eyes are slanted trying to read and understand some of it? Forgot this. The tools above also have the ability to get into 3g, 4g, bluetooth systems and a lot more. Edited September 27, 2013 by Visual Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.