Posted on 2003-11-14
Last Modified: 2010-04-11
hi! pliz help me here....
1) can u help me on using the public key    encryption to  show that encryption can be used NOT for security or protection?

2) how can i determine the minimum,average and maximum time it would take to crack a six-digit password if one can be checked every millisecond?
Question by:msberth
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Accepted Solution

TooKoolKris earned 125 total points
ID: 9748635
The purpose of public key is to encrypt data. Just because it is susceptable to being hacked doesn't mean that it's has no use in security and in data protection. It takes a lot to decrypt when a good key phrase is being used.

The time that is involved with decryption has many variables that must be defined before one could tell you the amount of time that it would take. The deeper the level of encryption the longer it's going to take. Obvoulsy the slower the CPU in your pc the longer it will take as well.

Here are some pages that you can look at:

Good PDF File:

LVL 18

Expert Comment

ID: 9748677

s0rry, we cann0t helP y0U w1th hOmew0rk ass1gnMENts

...academic honesty or other unethical behavior...  

Most commonly, this means that Experts are prohibited from doing your homework for you. They'll guide you and teach you, but don't ask them to write code to answer a question that seems like it was written for a test. It should be noted that just like bribery, while it's bad to offer a bribe, it's worse to take it -- so don't do homework.

"Homework" is loosely defined as an assigment, project or quiz offered up an instructor of a technical, trade or eductional institution as part of a scheduled course of instruction, for which the student receives some kind of credit. The Moderators know what homework looks like, and it will be your task to convince them it isn't.  


Expert Comment

ID: 9748694
Q: how long would it take someone to crack 128 bit encryption?

When the press talks about "cracking" or "breaking" an encryption algorithm. They always seem to mean this: the "attacker" decrypted a message by guessing the secret key that was used for the encryption. This is not breaking or cracking a particular algorithm. But it does demonstrate the importance of key size. The key size -- the number of bits used to store the key, which is an integer number -- determines the size of the key space, the number of possible keys that can be used. If you knew that to decrypt a message you needed to guess a number between 1 and 10, would you feel challenged? How about between 1 and 1000? How about 1 and 1^38 (1 followed by 38 zeros). That is (roughly) the key space using a 128-bit key. For comparison purposes, let’s use a (so far) non-existent computer that can guess 1 trillion (1 followed by 12 zeroes) keys a second. On average, it would take around 2 million million million (2 followed by 18 zeroes) years to guess the key.

Public Key Cryptography: A Continuation of the Discussion

How PGP works

Passwords vs Public Key Cryptography for encryption


Expert Comment

ID: 9748811
"s0rry, we cann0t helP y0U w1th hOmew0rk ass1gnMENts"

Nice touch,  talking to the kids in there own language :)

Expert Comment

ID: 9802529
Encryption is process to encrypt/coding and invited for security or protection.
Public key can be spreaded except private key.
But, maybe it can used for other thing.
Ex: for research only, for riddle only, to generating random character for designer :)

what you mean about "if one can be checked every millisecond?"
Are you mean 1 character every 1 millisecond ?
CPU able to check NOT one millisecond, but 1 char=1/million millisecond.
Yes, it can be cracked easly if your six digit password is the combination of numerical variable (0-9) only.
The time to crack the password is depend :
-how fast your CPU to try (brute force).
-how long your password digit.
-what variable in your password. (0-9,a-z,A-Z,all ASCII code, or the combination of thems)

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question