On Thu, 31 May 2001 07:45:40 -0500 "Mathew Ryden" <[EMAIL PROTECTED]>
writes:
> then you are seeing the effect of someone who didn't use an
> algorithm
> optomized for speed. if you do a similar thing with PGP you'll
> notice it's
> much faster - pgp also has installed things to make finding the
> password
> more difficult and from knowing how full an archive is -- I doubt
> UC2 has
> such stringent standards.
I don't want speed, I want security. If I have to wait longer for better
security, fine. :)
Also, I tried to encrypt with PGP and it restarted three times before it
got 10% done. What do I do?
> well, I'm 95% sure that each of Rand1 and Rand2 are 56 bits but I
> can't be
> bothered to double check for sure.
Well, you could look at UC2 yourself and test it's capabilities instead
of telling me what you THINK it's capabilities are. :)
I will agree with you that the more bits are used for the encryption key
the better. :)
In PGP the best passphrase is the longest and most complex, yet still
rememberable passphrase. :)
In UC2 the best password is generated by a random password generator and
is very difficult to remember. And the longer the password the better.
How would you do a brute force attack successfully against a UE2
encrypted archive? Do you just setup a program that generates passwords
till it finds the right one, or is there a way to crack open the file and
figure out the password from the content of the file?
________________________________________________________________
GET INTERNET ACCESS FROM JUNO!
Juno offers FREE or PREMIUM Internet access for less!
Join Juno today! For your FREE software, visit:
http://dl.www.juno.com/get/tagj.
_______________________________________________
Chat mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/chat