View Single Post
Old 08-23-2012, 09:07 AM   #44
ixtab
(offline)
ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.ixtab ought to be getting tired of karma fortunes by now.
 
ixtab's Avatar
 
Posts: 2,907
Karma: 6736094
Join Date: Dec 2011
Device: K3, K4, K5, KPW, KPW2
Quote:
Originally Posted by geekmaster View Post
EDIT: You did not say how many hash rounds you used in your test. Even if it is more than a single round, testing 1,000,000 keys in 35 seconds may require more rounds for good protection.
I didn't set any number of hash rounds at all. I simply used the existing classes from Amazon, providing a new Kindle serial number each time, and tried to open an encrypted AZW file with that. It lets me try about a million times in half a minute. But given that the key space is actually determined by the entropy of the serial number (*not* just the PID, as I initially thought), that's still a couple of hundred years to wait when brute-forcing. So yeah, I guess it's still not practical for the average home user who doesn't have a supercomputer at hand.
ixtab is offline   Reply With Quote