View Single Post
  #11   Spotlight this post!  
Unread 29-12-2008, 13:46
Bochek's Avatar
Bochek Bochek is offline
Registered User
AKA: Adam Bochek
FRC #2200 (MMRambotics)
Team Role: Mentor
 
Join Date: Jan 2007
Rookie Year: 2007
Location: Burlington, Ontario, Canada
Posts: 577
Bochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud ofBochek has much to be proud of
Re: 2009 decryption test

So i just did the math..... If we knew the password was 15 characters long, there are 768909704948766668552634368 possible combinations (assuming no special characters or spaces)

Using a brute force attack at an average rate of 7717 combinations/second this would take

99638422307731847680787 Seconds
1660640371795530794679 Minutes
27677339529925513244 Hours
1153222480413563051 Days
3168193627509788 Years
316819362750978 Decades ..... You get the point


So assuming my 1.6 x2 Ghz laptop can do 7717 combinations/second
to do it in 1 Day (24 hours) we would need

360382025129238453 Ghz of processing power. Or 112619382852887016 Newer computers


Seems fairly encrypted to me.
__________________
-----------------------------------------------
Adam Bochek - FRC 2200
http://www.mmrambotics.com
http://www.watchfirstnow.com
Reply With Quote