Not yet a member? No problem!
Sign-up just takes a second.
Forgot your password?
Recover it now.
Already signed up?
Log in now.
Forgot your password?
Recover it now.
Not yet a member? No problem!
Sign-up just takes a second.
Remember your password?
Log in now.
21 Comments
Stingraysays...Quoted from http://memory-alpha.org/wiki/Brothers_(episode)
The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.
westysays...Please enter digits 3,16,24,12,6,2,1 of your pass word to proceed to bank account.
longdesays...*promote
siftbotsays...Promoting this video and sending it back into the queue for one more try; last queued Tuesday, June 7th, 2011 8:26pm PDT - promote requested by longde.
blankfistsays...Sorry, character limit.
budzossays...Watched this episode the other day. Was bad-ass.
radxsays...But would the president use it for his luggage?
jimnmssays...>> ^Stingray:
Quoted from http://memory-alpha.org/wiki/Brothers_(episode)
The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.
Maybe not, I just read this the other day: "Cheap GPUs are rendering strong passwords useless."
Deanosays...>> ^jimnms:
>> ^Stingray:
Quoted from http://memory-alpha.org/wiki/Brothers_(episode)
The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.
Maybe not, I just read this the other day: "Cheap GPUs are rendering strong passwords useless."
But he could supplement his security with a SecureID dongle from RSA - oh.
antsays...>> ^jimnms:
>> ^Stingray:
Quoted from http://memory-alpha.org/wiki/Brothers_(episode)
The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.
Maybe not, I just read this the other day: "Cheap GPUs are rendering strong passwords useless."
Yeah, Data is way advanced than those. I'd like to see brute force!
messengersays...Apparently, he schooled the computer -- it made two mistakes, not registering the 7th character, "3", then adding a "1" between the 34th and 35th characters.
Yes, I have that kind of mind.
gwiz665says...Hmm, 3652?
Numbers: 10
Nato phonetic: 26
so that's the 36 possibilities powered by the number of characters: 52
Well shit, it's right. Trekkies always get their math right...
nanrodsays...Am I seeing it wrong it looks like 36^51 to me unless you count lock which is not part of Nato code
deathcowsays...> But he could supplement his security with a SecureID dongle from RSA - oh.
Actually they didnt pan down during the scene but he was using his dongle at this point as well.
albrite30says...error message. Please include one symbol and one capitalized letter. end message. fuck you
Paybacksays...>> ^deathcow:
> But he could supplement his security with a SecureID dongle from RSA - oh.
Actually they didnt pan down during the scene but he was using his dongle at this point as well.
Anthony Weiner wishes he secured HIS dongle.
residuesays...please enter the captcha code to continue
fuuuuuuuuu
jmzerosays...It's only 36^52 if the attacker knows there must be 52 characters, which seems fairly unlikely. Instead, assuming 52 is the longest likely password, you have to add up 36^52 + 36^51 + 36^50, etc...
In any case, this password is fairly secure. The brute force GPU methods another poster mentioned are currently viable against 9-10 character passwords, but only if we have the hash, and only if the hashing algorithm is very simple. The complexity of a hash would be something that we would expect to scale with processing power, so in terms of addressing this problem we could effectively assume that the resulting computer in TNG time would be about the same effectiveness as a current one (in terms of hashes analyzed per second).
Unfortunately, this password is about 10^62 times as complex as the largest viable brute force candidates. That is a large number.
jwraysays...that's only ~256 bits of entropy.
MonkeySpanksays...Bah, I can recite the last 3 phone numbers of the girls that dumped me without blinking as well, and I am not a stalker. You want to impress me data, tell me a racy joke with double-entendre.
siftbotsays...9 more comments have been lost in the ether at this killed duplicate.
Discuss...
Enable JavaScript to submit a comment.