Sign in with
Sign up | Sign in
Your question

Brute Force Decryption

Last response: in Applications
Share
May 6, 2010 2:00:59 AM

If you use a 128 bit, 256 bit, ect... encryption but only have a password that is, say, 20 characters long, doesn't that mean that in order to decrypt a system, an attack should be launched at a password? If this is the case, why does bit length matter?

More about : brute force decryption

May 6, 2010 4:19:13 AM

What Brute Force tool are you using, and why is this so important? Did you just forget a file password, or are you trying to do questionably legal things?

Please provide more info. Also, I believe that in most password cracking programs, the attack is launched at the file/application itself, but I may be wrong.

Also, 20 characters long is a lot more than 20 bits. Correct me if I'm wrong, but you seem to misunderstand encryption or perhaps the binary language altogether. A 20-digit password unencrypted would be 160 bits (20 X 8 because one character is a byte, not a bit).

I don't use Brute Force tools, but I do have one. I'm not too familiar with it, though, so I don't know the exact answer to your question. Hope this helps, though.
m
0
l
a b 8 Security
May 6, 2010 2:24:52 PM

Soundslike bruteification!....lol
m
0
l
Related resources
May 7, 2010 9:31:14 PM

I'm not doing anything. It's simply something I've never understood about encryption. That bits/character thing seems to clear it up.
m
0
l
May 8, 2010 2:55:19 AM

Cool let me know if you need anything else cleared up.
m
0
l
!