Difference between revisions of "Talk:ERF"
From Dragon Age Toolset Wiki
Line 4: | Line 4: | ||
: As far as I can tell, scheme 2 blowfish has a huge restriction on what passwords can be (8 digit passwords), this severely limits what possible passwords there are (100000000 AFAIK?). —[[User:Thought Process|Thought Process]] 00:21, 17 March 2011 (UTC) | : As far as I can tell, scheme 2 blowfish has a huge restriction on what passwords can be (8 digit passwords), this severely limits what possible passwords there are (100000000 AFAIK?). —[[User:Thought Process|Thought Process]] 00:21, 17 March 2011 (UTC) | ||
+ | |||
+ | :: Okay, that would indeed move it into the reasonably brute-forcable range. A very peculiar decision by BioWare... [[User:DocMcCoy|DocMcCoy]] 01:41, 17 March 2011 (UTC) |
Revision as of 02:41, 17 March 2011
Who in their right mind thinks that brute-forcing the Blowfish encryption will take "no more than 1 minute"?
Am I missing something here? As far as I can see, the checksum is the weakest point there. Still, 2^64 md5sum operations (worst-case) to brute-force the password from its checksum will take considerable more time than 1000 years, let alone 1 minute. From what I can see using a quick Google search, even using a dedicated FPGA won't get you into a reasonable time span. DocMcCoy 03:47, 15 March 2011 (UTC)
- As far as I can tell, scheme 2 blowfish has a huge restriction on what passwords can be (8 digit passwords), this severely limits what possible passwords there are (100000000 AFAIK?). —Thought Process 00:21, 17 March 2011 (UTC)
- Okay, that would indeed move it into the reasonably brute-forcable range. A very peculiar decision by BioWare... DocMcCoy 01:41, 17 March 2011 (UTC)