29.09.2015 Views

Legal Disclaimer

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

Hacking-For-Beginners-a-beginners-guide-for-learning-ethical-hacking

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hacking For Beginners – Manthan Desai 2010<br />

someone did manage to decrypt a transaction, that would not mean that they would have found the server's secret key; if<br />

they wanted to decrypt another transaction, they'd need to spend as much time and effort on the second transaction as<br />

they did on the first. Of course, they would have first have to have figured out some method of intercepting the<br />

transaction data in the first place, which is in itself extremely difficult. It would be significantly easier to tap your phone,<br />

or to intercept your mail to acquire your credit card number than to somehow intercept and decode Internet Data.<br />

Servers and browsers do encryption ranging from a 40-bit secret key to a 128-bit secret key, that is to say '2 to the 40th<br />

power' or '2 to the 128th power'. Many people have heard that 40-bit is insecure and that you need 128-bit to keep your<br />

credit card info safe. They feel that using a 40-bit key is insecure because it's vulnerable to a "brute force" attack<br />

(basically trying each of the 2^40 possible keys until you find the one that decrypts the message). This was in fact<br />

demonstrated when a French researcher used a network of fast workstations to crack a 40-bit encrypted message in a<br />

little over a week. Of course, even this 'vulnerability' is not really applicable to applications like an online credit card<br />

transaction, since the transaction is completed in a few moments. If a network of fast computers takes a week to crack a<br />

40-bit key, you'd be completed your transaction and long gone before the hacker even got started.<br />

Of course, using a 128-bit key eliminates any problem at all because there are 2^128 instead of 2^40 possible keys. Using<br />

the same method (a networked of fast workstations) to crack a message encrypted with such a key would take<br />

significantly longer than the age of the universe using conventional technology. Remember that 128-bit is not just 'three<br />

times' as powerful as 40-bit encryption. 2^128 is 'two times two, times two, times two...' with 128 two's. That is two,<br />

doubled on itself 128 times. 2^40 is already a HUGE number, about a trillion (that's a million, million!). Therefore 2^128<br />

is that number (a trillion), doubled over and over on itself another 88 times. Again, it would take significantly longer than<br />

the age of the universe to crack a 128-bit key.<br />

Key Size<br />

Possible Key Combinations<br />

2-bit 2^2 2x2 = 4<br />

3-bit 2^3 2x2x2 = 8<br />

4-bit 2^4 2x2x2x2 = 16<br />

5-bit 2^5 2x2x2x2x2 = 32<br />

6-bit 2^6 2x2x2x2x2x2 = 64<br />

7-bit 2^7 2x2x2x2x2x2x2 = 128<br />

8-bit 2^8 2x2x2x2x2x2x2x2 = 256<br />

9-bit 2^9 2x2x2x2x2x2x2x2x2 = 512<br />

10-bit 2^10 2x2x2x2x2x2x2x2x2x2 = 1024<br />

11-bit 2^11 2x2x2x2x2x2x2x2x2x2... = 2048<br />

12-bit 2^12 2x2x2x2x2x2x2x2x2x2... = 4096<br />

16-bit 2^16 2x2x2x2x2x2x2x2x2x2... = 65536<br />

24-bit 2^24 2x2x2x2x2x2x2x2x2x2... = 16.7 million<br />

30-bit 2^30 2x2x2x2x2x2x2x2x2x2... = 1 billion (1,073,741,800)<br />

w w w . h a c k i n g t e c h . c o . t v Page 218

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!