Hackers and Autism
sliqua-jcooter
Veteran

Joined: 25 Jan 2010
Age: 37
Gender: Male
Posts: 1,488
Location: Burke, Virginia, USA
This is completely false. There are plenty of problems which are still not tractable even for supercomputers. You can't brute force AES256 even with a supercomputer since it requires a search over a space of size 2^256 (yes, I know that AES lost two bits recently but that doesn't matter much here).
You're still trying to brute-force the key, not the passphrase that's used to derive the key. In a PKI situation, you're right - but we're talking about symmetrical encryption, so the key is NOT the weak point.
So what? I said assuming it's done properly which would rule out weak passphrases.
32-bit entropy is the average 14-character passphrase. Not exactly weak.
LUKS takes roughly 1 second per attempt at unlocking the key per passphrase (this is all dependent on the system clock-speed - but these are the numbers I got during my test) - with each system I was running I could run roughly 1000 attempts concurrently - which means the total capacity of the cluster I threw together was 10000 attempts per second.
_________________
Nothing posted here should be construed as the opinion or position of my company, or an official position of WrongPlanet in any way, unless specifically mentioned.
If you use a random passphrase that is long enough, then you will have to check 2^256 possible keys.
LUKS takes roughly 1 second per attempt at unlocking the key per passphrase (this is all dependent on the system clock-speed - but these are the numbers I got during my test) - with each system I was running I could run roughly 1000 attempts concurrently - which means the total capacity of the cluster I threw together was 10000 attempts per second.
I'm not sure what you mean by the average 14 character passphrase. However, if you use a random 14 character passphrase (with uppercase, lowercase numbers and symbols allowed) for example, then you will have more than 84 bits entropy and you won't be able to crack it with your method in a reasonable amount of time.
sliqua-jcooter
Veteran

Joined: 25 Jan 2010
Age: 37
Gender: Male
Posts: 1,488
Location: Burke, Virginia, USA
Yes, however most passwords aren't truely random. The password that unlocks your computer - by definition - has to be easily memorizable, which means that it more than likely follows certain patterns. For instance, I happened to know that my password was two uncommon english words, with certain letters substituted for numbers and standard punctuation.
_________________
Nothing posted here should be construed as the opinion or position of my company, or an official position of WrongPlanet in any way, unless specifically mentioned.
It's true that most passwords are far from random. However, it is possible (although tedious) to memorize random passwords.
I imagine you're right that many people's passwords are weak enough to be broken by brute force in a reasonable amount of time but if you use a strong password it can't be cracked by brute force. It's true that if you use rules for generating a password (as you describe) then it will likely decrease how secure it is.
Anyway, I'm not talking about the typical case.
sliqua-jcooter
Veteran

Joined: 25 Jan 2010
Age: 37
Gender: Male
Posts: 1,488
Location: Burke, Virginia, USA
And I'm not interested in the theoretical. Let's get to the real point in all of this, mainly that individuals don't have to go to extraordinary lengths to protect their data.
The reason I spent so much time (and money) to brute force my partition is because I had a financial incentive to do so in a greater magnitude than what I spent. Most people aren't going to spend hundreds or thousands of dollars on infrastructure to break security unless there's some incentive for them to do so (financial or otherwise).
I have yet to see an example of an individual whose security needs legitimately justified full-disk encryption. I've seen plenty of businesses where it made sense, but no individuals. I've since stopped using full-disk encryption, and instead I only encrypt files that actually need to be encrypted (which accounts for less than 1% of all the files on my disk).
_________________
Nothing posted here should be construed as the opinion or position of my company, or an official position of WrongPlanet in any way, unless specifically mentioned.
Delphiki
Veteran

Joined: 14 Apr 2012
Age: 182
Gender: Male
Posts: 1,415
Location: My own version of reality
I would like to hear how this would be done. It does not even boot into the bios without the dongle. It is the same security that Auto Desk use for their laptops so I should think it is pretty secure.
_________________
What our ancestors would really be thinking, if they were alive today, is: "Why is it so dark in here?" - Sir Terry Pratchett
sliqua-jcooter
Veteran

Joined: 25 Jan 2010
Age: 37
Gender: Male
Posts: 1,488
Location: Burke, Virginia, USA
I would like to hear how this would be done. It does not even boot into the bios without the dongle. It is the same security that Auto Desk use for their laptops so I should think it is pretty secure.
A) of course it boots some kind of BIOS (or EFI).
Those systems usually are USB smart card based - and smart cards credentials can be stolen right off the USB device once the system is booted and replayed later. I haven't seen any technology like this that hasn't been broken.
_________________
Nothing posted here should be construed as the opinion or position of my company, or an official position of WrongPlanet in any way, unless specifically mentioned.
Interesting. What about if the USB stick is removed and inaccessible after it has been booted. Will system still been under threat?
_________________
What our ancestors would really be thinking, if they were alive today, is: "Why is it so dark in here?" - Sir Terry Pratchett
It's not purely theoretical. Memorizing a 16 character random password is quite doable (I've done it before). Alternatively, you could memorize a medium length sentence (which would probably be a lot easier and arguably more secure). Either method would defeat brute force attacks.
Also, in your case you had additional information (the two long words) which an ordinary attacker wouldn't have known. Having to consider all possible choices for those two words would make brute force search much less manageable.
In practice full-disk encryption is often effective; for instance, a quick Google search reveals that it often prevents law-enforcement agencies from obtaining data from systems which use full-disk encryption so I'm not convinced that it is as ineffective as you seem to be suggesting. As I've mentioned before, I'm sure there are cases where poor security practices make it vulnerable to brute force attacks.
I would like to hear how this would be done. It does not even boot into the bios without the dongle. It is the same security that Auto Desk use for their laptops so I should think it is pretty secure.
You could make it secure if the USB stick was encrypted using a second key (which is also available to the hardware controlling the hard drive) which is inaccessible to the OS. However, the real problem is that any scheme based on storing the key on a USB stick can be broken by anyone who can steal the USB stick.
Similar Topics | |
---|---|
Did your Autism get better with age? |
Today, 1:17 am |
Autism and Arrogance |
23 Feb 2025, 12:47 pm |
Will We Discover What Causes Autism? |
25 Feb 2025, 11:30 am |
Autism challenges |
12 Jan 2025, 1:29 pm |