I think this is the key. It is possible to brute-force crack 128bit encryption, it just takes a very long time (even on modern hardware).I don't know if the computing resources are available nowadays to mount a successful brute force attack on a 128-bit encrypted packet (and get a result in a timely fashion).
Originally posted by: spyordie007
I think this is the key. It is possible to brute-force crack 128bit encryption, it just takes a very long time (even on modern hardware).I don't know if the computing resources are available nowadays to mount a successful brute force attack on a 128-bit encrypted packet (and get a result in a timely fashion).
Also there is a lot more to it than just the number of bits used for the key. Like what encryption algorythm is used, etc.
Originally posted by: spyordie007
I think this is the key. It is possible to brute-force crack 128bit encryption, it just takes a very long time (even on modern hardware).I don't know if the computing resources are available nowadays to mount a successful brute force attack on a 128-bit encrypted packet (and get a result in a timely fashion).
Also there is a lot more to it than just the number of bits used for the key. Like what encryption algorythm is used, etc.
Originally posted by: MrChad
1. It's not "IE's encryption".
2. I don't know if the computing resources are available nowadays to mount a successful brute force attack on a 128-bit encrypted packet (and get a result in a timely fashion). I could be wrong, however.
I could be wrong, but I was under the impression that with a decent sized DC group it would be possible to crack within a number of years; not billions...A long time as in all of the world's computers for a billion years or so...
Originally posted by: spyordie007
While on that topic (drag) the other end is also equally responsible for data security. It doesnt matter how secure the transport is if on the other end the server storing your credit card information has been compromised...
I could be wrong, but I was under the impression that with a decent sized DC group it would be possible to crack within a number of years; not billions...A long time as in all of the world's computers for a billion years or so...
(I think billions was the figure I first heard when 128bit was first starting to get used, and it was based on cracking it from a single computer)
Originally posted by: cubby1223
I always wondered about the encryption in web browsers. Sure looking at a single encrypted data packet, it's going to be dang tough to decrypt it back to its original form. But on the other hand, before the transmition of encrypted packets, the web browser must somehow learn from the server how to decrypt the data packets, so why can't a hacker just look at those initial data trasmitions and learn how to decrypt the future data?
Originally posted by: JEDI
i'm surprised microsoft didnt buy out PGP to get their 1024 bit encryption.
Originally posted by: JEDI
I'm thinking 128bit encryption is weak nowadays.
am i wrong?
Originally posted by: cubby1223
I always wondered about the encryption in web browsers. Sure looking at a single encrypted data packet, it's going to be dang tough to decrypt it back to its original form. But on the other hand, before the transmition of encrypted packets, the web browser must somehow learn from the server how to decrypt the data packets, so why can't a hacker just look at those initial data trasmitions and learn how to decrypt the future data?
Originally posted by: MrChad
Originally posted by: cubby1223
I always wondered about the encryption in web browsers. Sure looking at a single encrypted data packet, it's going to be dang tough to decrypt it back to its original form. But on the other hand, before the transmition of encrypted packets, the web browser must somehow learn from the server how to decrypt the data packets, so why can't a hacker just look at those initial data trasmitions and learn how to decrypt the future data?
SSL encryption is asymmetric; i.e. it uses public and private keys. The browser first sends a request for a secure session. The server replies with its public key. The browser creates a session key, then encrypts this session key using the server's public key. Only the server's private key can decrypt the encrypted session key. Once the session key has been established, secure communication can begin.
Here's a nice diagram
Or more specifically to ensure that you can trust the issuing authority and its parent CAswhich is why it's important to make sure the SSL cert verifies correctly.