Cameron Childress wrote:
> 
> How likely are collisions?  Assuming that MD5 uses a 36 character set (it
> appears to) for it's output, and it's 32 characters long, that would be a
> maximum of 36^32 (6.3340286662973277706162286946812e+49 per my windows calc)
> possible hash values you'd have to run through before your brute force
> attack would work.

With a returned 128 bit hash and under the assumption that the likehood 
of each generated hash is equal the expected amount if strings one would 
need to test to find something that generates the same hash is 2^127 
(1.7e+38).
However, the likehood of somebody using a set of more as 75 different 
characters (2*26 letters, 10 numbers and some more) in a password is 
quite small. Combine this with the likehood of a password being longer 
as 12 characters and the amount of possible passwords is about 3.16^22 
(75^12, maybe 62^8 is better but doesn't really matter for the 
argument). This means that 1.58e+22 is the expected amount of tries 
before finding the password.

Conclusion: the password itself has less entropy as the hash potentially 
has.

I would improve the password quality before worrying about the hash.

Jochem
______________________________________________________________________
Dedicated Windows 2000 Server
  PIII 800 / 256 MB RAM / 40 GB HD / 20 GB MO/XFER
  Instant Activation � $99/Month � Free Setup
  http://www.pennyhost.com/redirect.cfm?adcode=coldfusiona
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to