Re: TrueCrypt cracking in the future...Tech Discussion...
On Tue, 1 Feb 2011 01:47:21 -0500, DasFox wrote:
> I hear calculations of so many million years before a 64 character
> password will be brute-forced on TrueCrypt...
> I DOUBT...
A 64 character password is so incredibly strong (especially if it's
random) that it doesn't matter much about how fast computer
technology advances, it still wont be feasible to break it. This is
especially true due to the Landauer Limit, which basically means that
the energy requirements for the computation would be too large to be
feasible. You must take energy requirements into account and there
isn't enough energy on earth to do it.
> BUT I thought that works on a (unlikely) assumption that computer
> power will stay the same level it is now...
> For instance, in the past 100 years, there has been an EXPLOSION in
> IF the same happens this century, TrueCrypt files will be busted...
> Quantum computer can crack a 64 character TrueCrypt container, it
> actually take merely seconds, or still time-consuming but easier?
Quantum computers are the most effective against asymmetric (public
key) crypto and are less effective against symmetric ciphers like AES
or Twofish. The best a QC can do against something like AES is cut
the keylength in half. Thus, AES-256 will be as hard to break for a
QC as AES-128 is for classical computers.
Screw the socialist blue-eyed Skindonavian arsewholes.