Data Schools You on Password Security

Data got sick of people hacking his PS3 account...
Stingraysays...

Quoted from http://memory-alpha.org/wiki/Brothers_(episode)

The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.

jimnmssays...

>> ^Stingray:

Quoted from http://memory-alpha.org/wiki/Brothers_(episode)
The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.


Maybe not, I just read this the other day: "Cheap GPUs are rendering strong passwords useless."

Deanosays...

>> ^jimnms:

>> ^Stingray:
Quoted from http://memory-alpha.org/wiki/Brothers_(episode)
The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.

Maybe not, I just read this the other day: "Cheap GPUs are rendering strong passwords useless."


But he could supplement his security with a SecureID dongle from RSA - oh.

antsays...

>> ^jimnms:

>> ^Stingray:
Quoted from http://memory-alpha.org/wiki/Brothers_(episode)
The strength of Data's lockout code would potentially require trying 3652 combinations to break it, or 846,700,936,056,091,894,301,310,586,236,842,935,416,138,248,772,949,513,519,821,268,414,868,295,354,679,296 (8.467x1080) combinations – equivalent to cracking a 269-bit key in symmetric cryptography, something that is currently impossible to do.

Maybe not, I just read this the other day: "Cheap GPUs are rendering strong passwords useless."


Yeah, Data is way advanced than those. I'd like to see brute force!

jmzerosays...

It's only 36^52 if the attacker knows there must be 52 characters, which seems fairly unlikely. Instead, assuming 52 is the longest likely password, you have to add up 36^52 + 36^51 + 36^50, etc...

In any case, this password is fairly secure. The brute force GPU methods another poster mentioned are currently viable against 9-10 character passwords, but only if we have the hash, and only if the hashing algorithm is very simple. The complexity of a hash would be something that we would expect to scale with processing power, so in terms of addressing this problem we could effectively assume that the resulting computer in TNG time would be about the same effectiveness as a current one (in terms of hashes analyzed per second).

Unfortunately, this password is about 10^62 times as complex as the largest viable brute force candidates. That is a large number.

Send this Article to a Friend



Separate multiple emails with a comma (,); limit 5 recipients






Your email has been sent successfully!

Manage this Video in Your Playlists




notify when someone comments
X

This website uses cookies.

This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our Privacy Policy.

I agree
  
Learn More