Go to Post Who wants to see your robot get their butt handed to them? - Joe_Widen [more]
Home
Go Back   Chief Delphi > FIRST > General Forum
CD-Media   CD-Spy  
portal register members calendar search Today's Posts Mark Forums Read FAQ rules

 
Closed Thread
Thread Tools Rating: Thread Rating: 3 votes, 4.33 average. Display Modes
  #16   Spotlight this post!  
Unread 25-12-2013, 16:33
EricH's Avatar
EricH EricH is offline
New year, new team
FRC #1197 (Torbots)
Team Role: Engineer
 
Join Date: Jan 2005
Rookie Year: 2003
Location: SoCal
Posts: 19,814
EricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by yash101 View Post
Yeah. I know, but they probably will use a similar encryption technology. It doesn't seem impossible to brute-force it either. I wouldn't do that because it would be against the game, and bad sportsmanship. However, with an i7 extreme, dual GPUs, aiding the CPU and other stuff, it shouldn't be too hard.
Actually, it's against forum rules.

I will simply say this: 128-bit encryption, or something like it--and the password's a 20-30 character string. NOT crackable by brute force in the time we've got. The general consensus the last few times this was brought up is that if you actually succeed, go straight to the CIA with the successful crack and apply for a job.
__________________
Past teams:
2003-2007: FRC0330 BeachBots
2008: FRC1135 Shmoebotics
2012: FRC4046 Schroedinger's Dragons

"Rockets are tricky..."--Elon Musk

  #17   Spotlight this post!  
Unread 25-12-2013, 16:40
yash101 yash101 is offline
Curiosity | I have too much of it!
AKA: null
no team
 
Join Date: Oct 2012
Rookie Year: 2012
Location: devnull
Posts: 1,191
yash101 is an unknown quantity at this point
Re: 2014 Encrypted Competition Manual

True. Also, I don't have the materials to do so either! Intel's lowest i3, 2367 is what I work on. I deleted that last post because I don't want to encourage anyone to try that . But, since this can reside on an HDD, just use an SSD and state-of-the-are tech and you could possibly get it.


in short:
DONT WASTE YOUR TIME, BEING THE ONE DECRYPTING THE MANUAL, UNLESS YOU WANT TO SHELL OUT A TON OF MONEY AND RUIN THE 2014 KICKOFF FOR YOURSELF!!!
(I think that needed Caps )

Last edited by yash101 : 25-12-2013 at 16:44.
  #18   Spotlight this post!  
Unread 25-12-2013, 16:46
EricH's Avatar
EricH EricH is offline
New year, new team
FRC #1197 (Torbots)
Team Role: Engineer
 
Join Date: Jan 2005
Rookie Year: 2003
Location: SoCal
Posts: 19,814
EricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond reputeEricH has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by yash101 View Post
Also, it probably only has the alphanumeric characters, mostly out of the dictionary.
Nice try. ANY character that can be typed is fair game. 2008's password had not one but 4 punctuation marks. Nobody got it and the letters had already been given (though not all were in the right capitalization, and none were in the right order). And the password might just be a random sequence of letters and numbers--they've done that before, too.
__________________
Past teams:
2003-2007: FRC0330 BeachBots
2008: FRC1135 Shmoebotics
2012: FRC4046 Schroedinger's Dragons

"Rockets are tricky..."--Elon Musk

  #19   Spotlight this post!  
Unread 25-12-2013, 20:16
JesseK's Avatar
JesseK JesseK is offline
Expert Flybot Crasher
FRC #1885 (ILITE)
Team Role: Mentor
 
Join Date: Mar 2007
Rookie Year: 2005
Location: Reston, VA
Posts: 3,708
JesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond reputeJesseK has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by yash101 View Post
True. Also, I don't have the materials to do so either! Intel's lowest i3, 2367 is what I work on. I deleted that last post because I don't want to encourage anyone to try that . But, since this can reside on an HDD, just use an SSD and state-of-the-are tech and you could possibly get it
One does not brute force using 'Intel', at least not for another several years.

The rainbow table (fastest way to brute-force something) for a typical FIRST-generated password is potentially (96^20) entries long. (96 types of characters, roughly 20 characters in length). Divide that by 2,800,000,000 and you'll get how many seconds even the fastest ASIC processors can do it in.

You have much to read and learn, grasshoppa.
__________________

Drive Coach, 1885 (2007-present)
CAD Library Updated 5/1/16 - 2016 Curie/Carver Industrial Design Winner
GitHub
  #20   Spotlight this post!  
Unread 25-12-2013, 20:46
Anupam Goli's Avatar
Anupam Goli Anupam Goli is offline
PCH Q&A co-founder/Scouting Mentor
AKA: noops
FRC #1648 (G3 Robotics)
Team Role: Mentor
 
Join Date: Dec 2010
Rookie Year: 2008
Location: Atlanta, Georgia
Posts: 1,242
Anupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond reputeAnupam Goli has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by JesseK View Post
One does not brute force using 'Intel', at least not for another several years.

The rainbow table (fastest way to brute-force something) for a typical FIRST-generated password is potentially (96^20) entries long. (96 types of characters, roughly 20 characters in length). Divide that by 2,800,000,000 and you'll get how many seconds even the fastest ASIC processors can do it in.

You have much to read and learn, grasshoppa.
That's not assuming it's AES encrypted, which wouldn't surprise me if they did. Brute force is never an efficient way of breaking any modern encryption.
__________________
Team 1002: 2008-2012
Team 1648: 2012-2016
Georgia Tech Class of 2016
  #21   Spotlight this post!  
Unread 25-12-2013, 20:56
DonRotolo's Avatar
DonRotolo DonRotolo is offline
Back to humble
FRC #0832
Team Role: Mentor
 
Join Date: Jan 2005
Rookie Year: 2005
Location: Atlanta GA
Posts: 7,014
DonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond reputeDonRotolo has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

No, brute force is never efficient, but in some situations it can be useful.

Not in this case though. This is world-class encryption, with a key sufficiently long and diverse to preclude any brute force attack, or dictionary attack, or (really) any attack at all.

Frankly, you'd have a better chance of kidnapping Frank* and "torturing" it from him, or breaking into FIRST and rifling through their filing cabinets** to find a copy.

In other words: Yes, it is a convenience to have the manual, but it is as worthless as snow in Juneau*** until Kickoff.

* I bet he doesn't even know the decryption password anyway, so leave him alone please.
** I also bet they didn't leave any hard copies anywhere, anyway, so leave FIRST alone please.
*** Juneau what I mean?
__________________

I am N2IRZ - What's your callsign?
  #22   Spotlight this post!  
Unread 25-12-2013, 22:36
yash101 yash101 is offline
Curiosity | I have too much of it!
AKA: null
no team
 
Join Date: Oct 2012
Rookie Year: 2012
Location: devnull
Posts: 1,191
yash101 is an unknown quantity at this point
Re: 2014 Encrypted Competition Manual

Who cares anyways! It would be best to just wait for Kickoff. That way, you could build up your anticipation, until you are mount vesuvius, ready to explode. When KickOff comes around, you'll have a magnitude of times greater fun.
  #23   Spotlight this post!  
Unread 26-12-2013, 03:41
alectronic alectronic is offline
Registered User
no team (Volunteer)
Team Role: Alumni
 
Join Date: Dec 2008
Rookie Year: 2007
Location: Nevada
Posts: 342
alectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant futurealectronic has a brilliant future
Re: 2014 Encrypted Competition Manual

Hey mods, any chance we could get this thread locked or title changed? I think the discussion is getting a little borderline (with forum rules) and the title is misleading. Thx.
__________________
  #24   Spotlight this post!  
Unread 26-12-2013, 14:39
Aur0r4's Avatar
Aur0r4 Aur0r4 is offline
Engineering Mentor
AKA: Jim Browne
None #1058 (PVC Pirates)
Team Role: Engineer
 
Join Date: Mar 2005
Rookie Year: 2002
Location: Londonderry, NH
Posts: 65
Aur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant futureAur0r4 has a brilliant future
Send a message via AIM to Aur0r4
Re: 2014 Encrypted Competition Manual

I don't usually post on Chief Delphi, but when I do its on discussions about encryption...

Unless I'm missing something, I don't see how a discussion reiterating the complete uselessness of trying to break AES encryption in a few days (or centuries) with modern computers would be a rules violation? Given the length and complexity of FIRST passwords, you start to approach "eons" in actual time to brute force an AES crack with typical computers.

I guess I think its a bit unsporting to post on a thread JUST to ask the mods to eliminate it because you don't think its useful? Just my opinion.

That being said, AES can be broken instantly, and the resources to do that are out there, but lets just say that you would have to be a "former friend of Eddie" to have those abilities at your fingertips. I'm not one, btw. But I do know how they do it.
__________________
Jim Browne, EIT
Team 1058 - PVC Pirates
  #25   Spotlight this post!  
Unread 26-12-2013, 14:42
BBray_T1296's Avatar
BBray_T1296 BBray_T1296 is offline
I am Dave! Yognaut
AKA: Brian Bray
FRC #1296 (Full Metal Jackets)
Team Role: Mentor
 
Join Date: Jan 2011
Rookie Year: 2010
Location: Rockwall, TX
Posts: 947
BBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond reputeBBray_T1296 has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

Assuming 3.4GHz and 4 cores, (though this use of clock speed is entirely incorrect)
Let's just pretend we can sail along at 13.6 billion attempts per second
96^20 = 4.42 E39 possible combinations
There are 31557600 seconds in a year.
The universe is ~13.8 Billion years old

4.42 E39
(~3.16E7 * 1.36E10 * ~1.38E10)
Let's just say it would take a while.

So long, in fact, the entire lifetime of the universe from the Big Bang up until today, would be able to occur 750 Billion times before every combination was tried.
__________________
If molecular reactions are deterministic, are all universes identical?

RIP David Shafer: you will be missed



Last edited by BBray_T1296 : 26-12-2013 at 14:45.
  #26   Spotlight this post!  
Unread 26-12-2013, 22:36
Foster Foster is offline
Engineering Program Management
VRC #8081 (STEMRobotics)
Team Role: Mentor
 
Join Date: Jul 2007
Rookie Year: 2005
Location: Delaware
Posts: 1,393
Foster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond reputeFoster has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

As a security professional, and having seen the keys they used the last years, breaking into the document in a short time isn't possible. (unless FIRST/AndyMark lends you the 2.3 million node cluster they built to run FIRST Choice )

When I teach about encryption I talk about how long the message needs to be a secret. "Attack at Dawn" only needs to be safe for less than 24 hours. After dawn, the message is worthless.

So FIRST posts it on the 31'st, it only needs to hold up for 4 days. Even a short phrase "I believe that Robots ROCK!" or mangled into -> "1 b3l1eve th4t R0b0ts R0CK!" would be safe for a few weeks.

Quote:
Originally Posted by DonRotolo
Frankly, you'd have a better chance of kidnapping Frank and "torturing" it from him.
That made me laugh. In the Industrial Intellectual Property Theft Prevention World, bribing someone is the most common case of what happens. I doubt anyone will have much success with that either.

But, as an exercise to the casual password maven, fire up your GPU clusters and have a go AFTER kickoff. I'm willing to bet lunch that it will still be working on it when the next season is coming around.

Or maybe work on CAD of the new robot .....
__________________
Foster - VEX Delaware - 17 teams -- Chief Roboteer STEMRobotics.org
2010 - Mentor of the Year - VEX Clean Sweep World Championship
2006-2016, a decade of doing VEX, time really flies while having fun
Downingtown Area Robotics Web site and VEXMen Team Site come see what we can do for you.
  #27   Spotlight this post!  
Unread 26-12-2013, 22:52
IndySam's Avatar
IndySam IndySam is offline
Registered User
FRC #0829 (Digital Goats)
Team Role: Mentor
 
Join Date: Nov 2005
Rookie Year: 2004
Location: Indy
Posts: 3,362
IndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond reputeIndySam has a reputation beyond repute
Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by DonRotolo View Post
No, brute force is never efficient, but in some situations it can be useful.

Not in this case though. This is world-class encryption, with a key sufficiently long and diverse to preclude any brute force attack, or dictionary attack, or (really) any attack at all.

Frankly, you'd have a better chance of kidnapping Frank* and "torturing" it from him, or breaking into FIRST and rifling through their filing cabinets** to find a copy.

In other words: Yes, it is a convenience to have the manual, but it is as worthless as snow in Juneau*** until Kickoff.

* I bet he doesn't even know the decryption password anyway, so leave him alone please.
** I also bet they didn't leave any hard copies anywhere, anyway, so leave FIRST alone please.
*** Juneau what I mean?
Juneau is a bad example. It is in a temperate zone and really doesn't get that cold.
__________________
"Champions are champions not because they do anything extraordinary but because they do the ordinary things better than anyone else." —Chuck Knoll


2015 Indianapolis District Winner
2014 Boilermaker Regional Industrial Design Award
2013 Smoky Mountain Regional Industrial Design Award
2012 Boilermaker Engineering Excellence Award
2010 Boilermaker Rockwell Innovation in Control Award.
2009 Buckeye J&J Gracious Professionalism Award
2009 Boilermaker J&J Gracious Professionalism Award
2008 Boilermaker J&J Gracious Professionalism Award
2007 St Louis Regional Winners
  #28   Spotlight this post!  
Unread 26-12-2013, 23:13
DavisC DavisC is offline
Registered User
FRC #0539 (Titans)
Team Role: College Student
 
Join Date: Jul 2011
Rookie Year: 2010
Location: Virginia
Posts: 200
DavisC is just really niceDavisC is just really niceDavisC is just really niceDavisC is just really nice
Wink Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by DonRotolo View Post
Frankly, you'd have a better chance of kidnapping Frank* and "torturing" it from him, or breaking into FIRST and rifling through their filing cabinets** to find a copy.
My idea was to just fly over to Russia and ask Snowden for the manual, and if they already worked up drawings for the next year's games then you can go ahead and get a peak at that
__________________
FRC Team 539
Student Member: 2010 Breakaway - 2014 Aerial Assist
Mentor: 2015 Recycle Rush - present
  #29   Spotlight this post!  
Unread 27-12-2013, 03:13
runneals's Avatar
runneals runneals is offline
FTC Mentor - The Robot Corps 7491
FRC #3928 (Team Neutrino)
Team Role: Alumni
 
Join Date: Oct 2012
Rookie Year: 2006
Location: Nevada, Iowa
Posts: 397
runneals has a spectacular aura aboutrunneals has a spectacular aura about
Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by yash101 View Post
I can't wait till they give the manual and then the password on kickoff so I can unlock the file and find out about the game (on kickoff). By the way, is the file a locked PDF or a locked ZIP folder containing the files, or a zip folder containing the PDFs, each locked, maybe with their own passwords?!?
It would be nice if they had the 'unlocked' pdfs in a locked zip folder, so teams (and people like me) don't have to enter in the password when they reopen the doc... just a thought though (although maybe zips are less secure than locked pdfs)
__________________
David Runneals
FRC 3928 Team Neutrino 4-H: Mentor (2015 Off-Season - ?)
FTC North Super Regional Championship: Game Announcer (2015)
FTC 7491 The Robot Corps 4-H: Mentor (2013 - ?)
FRC 2167 Mentor (2014)
FRC 3928 Team Neutrino 4-H: Member, Co-Captain, & Media Coordinator (2013)
  #30   Spotlight this post!  
Unread 27-12-2013, 03:24
runneals's Avatar
runneals runneals is offline
FTC Mentor - The Robot Corps 7491
FRC #3928 (Team Neutrino)
Team Role: Alumni
 
Join Date: Oct 2012
Rookie Year: 2006
Location: Nevada, Iowa
Posts: 397
runneals has a spectacular aura aboutrunneals has a spectacular aura about
Re: 2014 Encrypted Competition Manual

Quote:
Originally Posted by Foster View Post
As a security professional, and having seen the keys they used the last years, breaking into the document in a short time isn't possible. (unless FIRST/AndyMark lends you the 2.3 million node cluster they built to run FIRST Choice )
I've done my fair share of Cyber Defense Competitions at ISU (on blue, green, and red teams) and I would say that the easiest way would be to social engineer it out of one of people who holds the key to the fortress through an online login, just chatting on the phone, or sneaking into FIRST HQ (although they are probably smarter than you). If you are really that bored right now, you could be doing some other things, such as learning about social engineering on Youtube.
__________________
David Runneals
FRC 3928 Team Neutrino 4-H: Mentor (2015 Off-Season - ?)
FTC North Super Regional Championship: Game Announcer (2015)
FTC 7491 The Robot Corps 4-H: Mentor (2013 - ?)
FRC 2167 Mentor (2014)
FRC 3928 Team Neutrino 4-H: Member, Co-Captain, & Media Coordinator (2013)
Closed Thread


Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -5. The time now is 20:40.

The Chief Delphi Forums are sponsored by Innovation First International, Inc.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Copyright © Chief Delphi