Brute Force Decryption

nonxcarbonx

Distinguished
Jun 6, 2009
36
0
18,580
0
If you use a 128 bit, 256 bit, ect... encryption but only have a password that is, say, 20 characters long, doesn't that mean that in order to decrypt a system, an attack should be launched at a password? If this is the case, why does bit length matter?
 

Bruceification73

Distinguished
Oct 5, 2009
169
0
18,660
9
What Brute Force tool are you using, and why is this so important? Did you just forget a file password, or are you trying to do questionably legal things?

Please provide more info. Also, I believe that in most password cracking programs, the attack is launched at the file/application itself, but I may be wrong.

Also, 20 characters long is a lot more than 20 bits. Correct me if I'm wrong, but you seem to misunderstand encryption or perhaps the binary language altogether. A 20-digit password unencrypted would be 160 bits (20 X 8 because one character is a byte, not a bit).

I don't use Brute Force tools, but I do have one. I'm not too familiar with it, though, so I don't know the exact answer to your question. Hope this helps, though.
 
Thread starter Similar threads Forum Replies Date
D Antivirus / Security / Privacy 0
V Antivirus / Security / Privacy 1
M Antivirus / Security / Privacy 1
S Antivirus / Security / Privacy 10
WINTERLORD Antivirus / Security / Privacy 1
T Antivirus / Security / Privacy 1
R Antivirus / Security / Privacy 2
Avast-Team Antivirus / Security / Privacy 2
K Antivirus / Security / Privacy 1
S Antivirus / Security / Privacy 3
gumbob3 Antivirus / Security / Privacy 4
I Antivirus / Security / Privacy 5
P Antivirus / Security / Privacy 11
S Antivirus / Security / Privacy 5
firefoxx04 Antivirus / Security / Privacy 11
uplink-svk Antivirus / Security / Privacy 29
F Antivirus / Security / Privacy 3
M Antivirus / Security / Privacy 7
voyager1 Antivirus / Security / Privacy 1
D Antivirus / Security / Privacy 6

ASK THE COMMUNITY