Most common encryption algorithms are well known and documented. It
isn't knowing how a code is generated with modern encryption, it is the
number of permutations that are available that makes them hard to break
(well until they get the molecular pairing worked out).
You can break any individual key if you have the time and the system
lets you keep trying. You just may need a lifetime to do it.
In general it is much easier to target known user weaknesses and spend
the time researching the staff/building security/remote access systems
that it is to try to break one code.
--
Michael Hawksworth
Visual Fox Solutions
[EMAIL PROTECTED]
www.foxpro.co.uk
_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
** All postings, unless explicitly stated otherwise, are the opinions of the
author, and do not constitute legal or medical advice. This statement is added
to the messages for those lawyers who are too stupid to see the obvious.