It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: flatbush71
Well,IMHO, you have won the Isser Harel award for persistence in finding a method and you also have a interesting source.
The only thing remaining is product. A few hundred extra hours of process time won't be problem.
I for one will be very interested in your results, in a few weeks or how ever long it takes.
Best of luck.
Buck
originally posted by: PBL666
My first thought was: "which HD did I leave the insurance files on?" [looks to the pile of HDD's on the floor to my left]. My second thought was: "dont build a Beowulf cluster, use your works datacentre". My third though was slightly more personal...
I know this adds little to the discussion, but as someone who works with encrypted authentication systems, this is very much in my area of interest, and wish to follow this, not necessarily contribute.
Thanks.
originally posted by: PBL666
a reply to: StargateSG7
I dont mean to offend, but you make some assumptions about clustering that "in theory" may work, but in reality they dont. Beowulf clustering is not what you want for this, I'd give you space but I'll get in the # and never get another contract. I was using Hazelcast for "clustering" in my last job, not the same as Beowulf, its software layer--are you getting what I'm trying to say?.
Forget the hardware restraints, these are not the problem, it can be done with software, as another user mentioned, hire (or make) a botnet; hell even Amazon will rent you the hardware (at inflated costs), I wont dig my own career grave here, just please keep the thread updated.
Thanks.
originally posted by: Jukiodone
a reply to: StargateSG7
Before you go and get your CPU's fired up have you verified this is in fact a real press release/paper?
Every now and again someone claims to have cracked AES because:
A: There is substantial evidence that known weaknesses have been intentionally incorporated into such solutions in the past.
B: Any static solution is only temporarily effective when operating in a dynamic environment.
I have heard a few whispers/"what if's" over the past 5 years about AES (due to the above points) but have you got a link to the actual UoT press release/paper??
originally posted by: Jukiodone
a reply to: StargateSG7
Before you go and get your CPU's fired up have you verified this is in fact a real press release/paper?
Every now and again someone claims to have cracked AES because:
A: There is substantial evidence that known weaknesses have been intentionally incorporated into such solutions in the past.
B: Any static solution is only temporarily effective when operating in a dynamic environment.
I have heard a few whispers/"what if's" over the past 5 years about AES (due to the above points) but have you got a link to the actual UoT press release/paper??
originally posted by: Jukiodone
-----BEGIN PGP MESSAGE-----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=UlJg
-----END PGP MESSAGE-----
If you can respond in the required manner I will happily vouch for you.
originally posted by: Jukiodone
-----BEGIN PGP MESSAGE-----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=UlJg
-----END PGP MESSAGE-----
If you can respond in the required manner I will happily vouch for you.
originally posted by: IQPREREQUISITE
To simplify things...basically them nerds are trying to brute force the encrypted files?
Without the key wouldn't that take..........................nevermind. I couldn't even understand Liber Primus much less follow the technical mathematics of this thread.
Goodluck!