On Thu, 31 May 2001 07:45:40 -0500 "Mathew Ryden" <[EMAIL PROTECTED]>
writes:

> then you are seeing the effect of someone who didn't use an 
> algorithm
> optomized for speed. if you do a similar thing with PGP you'll 
> notice it's
> much faster - pgp also has installed things to make finding the 
> password
> more difficult and from knowing how full an archive is -- I doubt 
> UC2 has
> such stringent standards.

I don't want speed, I want security.  If I have to wait longer for better
security, fine. :)

Also, I tried to encrypt with PGP and it restarted three times before it
got 10% done.  What do I do?

> well, I'm 95% sure that each of Rand1 and Rand2 are 56 bits but I 
> can't be
> bothered to double check for sure.

Well, you could look at UC2 yourself and test it's capabilities instead
of telling me what you THINK it's capabilities are. :)

I will agree with you that the more bits are used for the encryption key
the better. :)

In PGP the best passphrase is the longest and most complex, yet still
rememberable passphrase. :)

In UC2 the best password is generated by a random password generator and
is very difficult to remember.  And the longer the password the better.

How would you do a brute force attack successfully against a UE2
encrypted archive?  Do you just setup a program that generates passwords
till it finds the right one, or is there a way to crack open the file and
figure out the password from the content of the file?
________________________________________________________________
GET INTERNET ACCESS FROM JUNO!
Juno offers FREE or PREMIUM Internet access for less!
Join Juno today!  For your FREE software, visit:
http://dl.www.juno.com/get/tagj.

_______________________________________________
Chat mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/chat

Reply via email to