![]() |
Re: 2014 Encrypted Competition Manual
Quote:
I will simply say this: 128-bit encryption, or something like it--and the password's a 20-30 character string. NOT crackable by brute force in the time we've got. The general consensus the last few times this was brought up is that if you actually succeed, go straight to the CIA with the successful crack and apply for a job. |
Re: 2014 Encrypted Competition Manual
True. Also, I don't have the materials to do so either! Intel's lowest i3, 2367 is what I work on. I deleted that last post because I don't want to encourage anyone to try that ;). But, since this can reside on an HDD, just use an SSD and state-of-the-are tech and you could possibly get it.
in short: DONT WASTE YOUR TIME, BEING THE ONE DECRYPTING THE MANUAL, UNLESS YOU WANT TO SHELL OUT A TON OF MONEY AND RUIN THE 2014 KICKOFF FOR YOURSELF!!! (I think that needed Caps :D) |
Re: 2014 Encrypted Competition Manual
Quote:
|
Re: 2014 Encrypted Competition Manual
Quote:
The rainbow table (fastest way to brute-force something) for a typical FIRST-generated password is potentially (96^20) entries long. (96 types of characters, roughly 20 characters in length). Divide that by 2,800,000,000 and you'll get how many seconds even the fastest ASIC processors can do it in. You have much to read and learn, grasshoppa. |
Re: 2014 Encrypted Competition Manual
Quote:
|
Re: 2014 Encrypted Competition Manual
No, brute force is never efficient, but in some situations it can be useful.
Not in this case though. This is world-class encryption, with a key sufficiently long and diverse to preclude any brute force attack, or dictionary attack, or (really) any attack at all. Frankly, you'd have a better chance of kidnapping Frank* and "torturing" it from him, or breaking into FIRST and rifling through their filing cabinets** to find a copy. In other words: Yes, it is a convenience to have the manual, but it is as worthless as snow in Juneau*** until Kickoff. * I bet he doesn't even know the decryption password anyway, so leave him alone please. ** I also bet they didn't leave any hard copies anywhere, anyway, so leave FIRST alone please. *** Juneau what I mean? |
Re: 2014 Encrypted Competition Manual
Who cares anyways! It would be best to just wait for Kickoff. That way, you could build up your anticipation, until you are mount vesuvius, ready to explode. When KickOff comes around, you'll have a magnitude of times greater fun.
|
Re: 2014 Encrypted Competition Manual
Hey mods, any chance we could get this thread locked or title changed? I think the discussion is getting a little borderline (with forum rules) and the title is misleading. Thx.
|
Re: 2014 Encrypted Competition Manual
I don't usually post on Chief Delphi, but when I do its on discussions about encryption...
Unless I'm missing something, I don't see how a discussion reiterating the complete uselessness of trying to break AES encryption in a few days (or centuries) with modern computers would be a rules violation? Given the length and complexity of FIRST passwords, you start to approach "eons" in actual time to brute force an AES crack with typical computers. I guess I think its a bit unsporting to post on a thread JUST to ask the mods to eliminate it because you don't think its useful? Just my opinion. That being said, AES can be broken instantly, and the resources to do that are out there, but lets just say that you would have to be a "former friend of Eddie" to have those abilities at your fingertips. I'm not one, btw. But I do know how they do it. |
Re: 2014 Encrypted Competition Manual
Assuming 3.4GHz and 4 cores, (though this use of clock speed is entirely incorrect)
Let's just pretend we can sail along at 13.6 billion attempts per second 96^20 = 4.42 E39 possible combinations There are 31557600 seconds in a year. The universe is ~13.8 Billion years old 4.42 E39 (~3.16E7 * 1.36E10 * ~1.38E10) Let's just say it would take a while. So long, in fact, the entire lifetime of the universe from the Big Bang up until today, would be able to occur 750 Billion times before every combination was tried. |
Re: 2014 Encrypted Competition Manual
As a security professional, and having seen the keys they used the last years, breaking into the document in a short time isn't possible. (unless FIRST/AndyMark lends you the 2.3 million node cluster they built to run FIRST Choice :rolleyes:)
When I teach about encryption I talk about how long the message needs to be a secret. "Attack at Dawn" only needs to be safe for less than 24 hours. After dawn, the message is worthless. So FIRST posts it on the 31'st, it only needs to hold up for 4 days. Even a short phrase "I believe that Robots ROCK!" or mangled into -> "1 b3l1eve th4t R0b0ts R0CK!" would be safe for a few weeks. Quote:
But, as an exercise to the casual password maven, fire up your GPU clusters and have a go AFTER kickoff. I'm willing to bet lunch that it will still be working on it when the next season is coming around. Or maybe work on CAD of the new robot ..... |
Re: 2014 Encrypted Competition Manual
Quote:
|
Re: 2014 Encrypted Competition Manual
Quote:
|
Re: 2014 Encrypted Competition Manual
Quote:
|
Re: 2014 Encrypted Competition Manual
Quote:
|
| All times are GMT -5. The time now is 14:58. |
Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Copyright © Chief Delphi