Jump to content

captinkrunch

Active Members
  • Posts

    2
  • Joined

  • Last visited

Posts posted by captinkrunch

  1. Technically everything encrypted is crackable, the strength behind an encryption is whether or not it is computationally feasable to recover the key. Basically to decrypt the ciphertext output by encryption algorithms that are called "uncrackable" you would need to enumerate all possible keys in order to recover the original data. For example, suppose that you use an encryption algorithm using a 128-bit key. Then you would need to try 2^128 keys by trying to break the encryption algorithm by brute force (assuming that cryptanalysis doesn't reduce the number of possibilities given a ciphertext), which even on hundreds of super computers would take hundreds of years if not more to break (don't feel like doing the math right now). AES is one of the most secure symmetric encryption algorithms as of now so if you use truecrypt I would probably choose that encryption algorithm. However, I read a research paper a few months ago where they basically found that if someone get's your computer in sleep mode they can examine memory to recover your encryption key (they didn't test truecrypt although). So furthermore, disk encryption is only secure if the computer is not powered on when it is taken.

    i belive its called cold starting (could be wrong) i also have seen ppl who unplug the comp plug it back in with a thumb drive for some reason or another it can recover the password some how (was awile ago cant rember) i was just woundering if u formated a drive if the encryption was still on the data you could forenscly pick up

  2. hello i heard turecrypt was pretty much impossible to crack my question to u is if u format the drive could you then use forensics to dig up info/data???

    i realize this is probally a stupid question but i would like to kno thanks!!

×
×
  • Create New...