Talk:ERF

From Dragon Age Toolset Wiki
Jump to: navigation, search

Who in their right mind thinks that brute-forcing the Blowfish encryption will take "no more than 1 minute"?

Am I missing something here? As far as I can see, the checksum is the weakest point there. Still, 2^64 md5sum operations (worst-case) to brute-force the password from its checksum will take considerable more time than 1000 years, let alone 1 minute. From what I can see using a quick Google search, even using a dedicated FPGA won't get you into a reasonable time span. DocMcCoy 03:47, 15 March 2011 (UTC)

As far as I can tell, scheme 2 blowfish has a huge restriction on what passwords can be (8 digit passwords), this severely limits what possible passwords there are (100000000 AFAIK?). —Thought Process 00:21, 17 March 2011 (UTC)
Okay, that would indeed move it into the reasonably brute-forcable range. A very peculiar decision by BioWare... DocMcCoy 01:41, 17 March 2011 (UTC)


What's the difference between "2 Blowfish" and "3 Blowfish (Dragon Age 2 only)" encryptions? SergeySW 23:40, 30 July 2011 (UTC)