Posted on 2003-11-14
Last Modified: 2010-04-11
hi! pliz help me here....
1) can u help me on using the public key    encryption to  show that encryption can be used NOT for security or protection?

2) how can i determine the minimum,average and maximum time it would take to crack a six-digit password if one can be checked every millisecond?
Question by:msberth

Accepted Solution

TooKoolKris earned 125 total points
ID: 9748635
The purpose of public key is to encrypt data. Just because it is susceptable to being hacked doesn't mean that it's has no use in security and in data protection. It takes a lot to decrypt when a good key phrase is being used.

The time that is involved with decryption has many variables that must be defined before one could tell you the amount of time that it would take. The deeper the level of encryption the longer it's going to take. Obvoulsy the slower the CPU in your pc the longer it will take as well.

Here are some pages that you can look at:

Good PDF File:

LVL 18

Expert Comment

ID: 9748677

s0rry, we cann0t helP y0U w1th hOmew0rk ass1gnMENts

...academic honesty or other unethical behavior...  

Most commonly, this means that Experts are prohibited from doing your homework for you. They'll guide you and teach you, but don't ask them to write code to answer a question that seems like it was written for a test. It should be noted that just like bribery, while it's bad to offer a bribe, it's worse to take it -- so don't do homework.

"Homework" is loosely defined as an assigment, project or quiz offered up an instructor of a technical, trade or eductional institution as part of a scheduled course of instruction, for which the student receives some kind of credit. The Moderators know what homework looks like, and it will be your task to convince them it isn't.  


Expert Comment

ID: 9748694
Q: how long would it take someone to crack 128 bit encryption?

When the press talks about "cracking" or "breaking" an encryption algorithm. They always seem to mean this: the "attacker" decrypted a message by guessing the secret key that was used for the encryption. This is not breaking or cracking a particular algorithm. But it does demonstrate the importance of key size. The key size -- the number of bits used to store the key, which is an integer number -- determines the size of the key space, the number of possible keys that can be used. If you knew that to decrypt a message you needed to guess a number between 1 and 10, would you feel challenged? How about between 1 and 1000? How about 1 and 1^38 (1 followed by 38 zeros). That is (roughly) the key space using a 128-bit key. For comparison purposes, let’s use a (so far) non-existent computer that can guess 1 trillion (1 followed by 12 zeroes) keys a second. On average, it would take around 2 million million million (2 followed by 18 zeroes) years to guess the key.

Public Key Cryptography: A Continuation of the Discussion

How PGP works

Passwords vs Public Key Cryptography for encryption


Expert Comment

ID: 9748811
"s0rry, we cann0t helP y0U w1th hOmew0rk ass1gnMENts"

Nice touch,  talking to the kids in there own language :)

Expert Comment

ID: 9802529
Encryption is process to encrypt/coding and invited for security or protection.
Public key can be spreaded except private key.
But, maybe it can used for other thing.
Ex: for research only, for riddle only, to generating random character for designer :)

what you mean about "if one can be checked every millisecond?"
Are you mean 1 character every 1 millisecond ?
CPU able to check NOT one millisecond, but 1 char=1/million millisecond.
Yes, it can be cracked easly if your six digit password is the combination of numerical variable (0-9) only.
The time to crack the password is depend :
-how fast your CPU to try (brute force).
-how long your password digit.
-what variable in your password. (0-9,a-z,A-Z,all ASCII code, or the combination of thems)

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article explains in simple steps how to renew expiring Exchange Server Internal Transport Certificate.
Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now