Just did a bit of googling, seems that, despite the numerous security vulnerabilities found in it, preimage resistance (which is what we're interested in here) has not been broken for MD5. However, I reckon that if you tried bruteforcing it with all possible combinations of 1-3 of the first, let's say, 100,000 most-used English words, you'd end up with the password faster than everyone else trying to solve the puzzle. Wikipedia helpfully notes that an old Nvidia GeForce 8800 can calculate 200 million MD5 hashes in a second, so I figure that my AMD radeon HD 7970 could do at least 20 billion h/s, which works out to a little less than 14 hours, worst-case scenario. If the password was 4 words long, on the other hand, that would take just under 159 years.
So, really, considering the amount of hardware, expertise, and work required to pull something like this off, if someone does actually end up bruteforcing the password to one of the future contests, I'd just go ahead and give em the prize anyway.
So what you're saying is: More words in the final code.
I think you're underestimating how hard it is to write code to run on a GPU. Only about 1 in every 3 AMD drivers work properly as it is, try making em do something they weren't meant to do.
But, hell, if it makes you feel any less paranoid, I say go for it. Throw some french in there too, or maybe some in-game words like "Vsec" that don't show up in the dictionary. As of right now, brute forcing it is just incredibly unlikely, doing any of those would make it impossible (assuming none of us have access to the dozens of acres of supercomputer racks hidden under NSA HQ, that is).
You never cease to amaze and disgust in the same breathe, Craig. -- [G➃AT]ASTROBOT
Just did a bit of googling, seems that, despite the numerous security vulnerabilities found in it, preimage resistance (which is what we're interested in here) has not been broken for MD5. However, I reckon that if you tried bruteforcing it with all possible combinations of 1-3 of the first, let's say, 100,000 most-used English words, you'd end up with the password faster than everyone else trying to solve the puzzle. Wikipedia helpfully notes that an old Nvidia GeForce 8800 can calculate 200 million MD5 hashes in a second, so I figure that my AMD radeon HD 7970 could do at least 20 billion h/s, which works out to a little less than 14 hours, worst-case scenario. If the password was 4 words long, on the other hand, that would take just under 159 years.
So, really, considering the amount of hardware, expertise, and work required to pull something like this off, if someone does actually end up bruteforcing the password to one of the future contests, I'd just go ahead and give em the prize anyway.
So what you're saying is: More words in the final code.
I think you're underestimating how hard it is to write code to run on a GPU. Only about 1 in every 3 AMD drivers work properly as it is, try making em do something they weren't meant to do.
But, hell, if it makes you feel any less paranoid, I say go for it. Throw some french in there too, or maybe some in-game words like "Vsec" that don't show up in the dictionary. As of right now, brute forcing it is just incredibly unlikely, doing any of those would make it impossible (assuming none of us have access to the dozens of acres of supercomputer racks hidden under NSA HQ, that is).
A straight brute force, of 1 character case, on this machine, for 16 characters ONLY would run me for over a year on this machine. You also need to assume the other 1-15 set for that character set, and the 1-16 set of the other character case.
So basically.... You either assume I have something I really don't have... or the fact that I'm so **** lazy that I'd wait a year even with that foreknowledge to crack a passcode. No I'd rather use a better method or attack the integrity correctly. @CM LXC
Just did a bit of googling, seems that, despite the numerous security vulnerabilities found in it, preimage resistance (which is what we're interested in here) has not been broken for MD5. However, I reckon that if you tried bruteforcing it with all possible combinations of 1-3 of the first, let's say, 100,000 most-used English words, you'd end up with the password faster than everyone else trying to solve the puzzle. Wikipedia helpfully notes that an old Nvidia GeForce 8800 can calculate 200 million MD5 hashes in a second, so I figure that my AMD radeon HD 7970 could do at least 20 billion h/s, which works out to a little less than 14 hours, worst-case scenario. If the password was 4 words long, on the other hand, that would take just under 159 years.
So, really, considering the amount of hardware, expertise, and work required to pull something like this off, if someone does actually end up bruteforcing the password to one of the future contests, I'd just go ahead and give em the prize anyway.
So what you're saying is: More words in the final code.
or have a combination of words from different languages. that way the alphabet and words aren't limited to standard english and can become near impossible to brute force
Been checking my email like a mad man, do I have to post my email?
Have you checked your spam folder? Are you absolutely certain the email you're checking is the one associated with this account?
i just imagine that LXC has trouble being able to fetch our emails. or forgot, which i myself forgets quite a bit and almost forgot I'm one of the champions of this lore lol
also the reason no one can start a chat with LXC is because his box is full. KIX support told me on twitter when i reported the "couldn't start chat" thing as a bug
Been checking my email like a mad man, do I have to post my email?
Have you checked your spam folder? Are you absolutely certain the email you're checking is the one associated with this account?
i just imagine that LXC has trouble being able to fetch our emails. or forgot, which i myself forgets quite a bit and almost forgot I'm one of the champions of this lore lol
Nope. All that information is readily accessible for him, being a previous Senior QA. BUT, he would only have the emails associated with your VEGA account, so that's why I'm saying you should double check that that IS the one you're checking.
Been checking my email like a mad man, do I have to post my email?
Have you checked your spam folder? Are you absolutely certain the email you're checking is the one associated with this account?
i just imagine that LXC has trouble being able to fetch our emails. or forgot, which i myself forgets quite a bit and almost forgot I'm one of the champions of this lore lol
Nope. All that information is readily accessible for him, being a previous Senior QA. BUT, he would only have the emails associated with your VEGA account, so that's why I'm saying you should double check that that IS the one you're checking.
i only use my one email. and LXC. I KNOW YOU CAN SEE THIS. lul. rekt.
For the love of Mara dont make it more inceptive lol
Excited to have it before crossfire starts
But, hell, if it makes you feel any less paranoid, I say go for it. Throw some french in there too, or maybe some in-game words like "Vsec" that don't show up in the dictionary. As of right now, brute forcing it is just incredibly unlikely, doing any of those would make it impossible (assuming none of us have access to the dozens of acres of supercomputer racks hidden under NSA HQ, that is).
-- [G➃AT]ASTROBOT
So basically.... You either assume I have something I really don't have... or the fact that I'm so **** lazy that I'd wait a year even with that foreknowledge to crack a passcode. No I'd rather use a better method or attack the integrity correctly.
@CM LXC
Nothing yet but patiently waiting
Been checking my email like a mad man, do I have to post my email?
Im 95% sure but I'll double check everything
I have Support tickets in my email so I think this is the right one I hope
and do you have memes on hand always?
[email protected]
Same lol
Lex be like...