How fast can hackers crack 128 bit file encryption?

In summary: This is because different algorithms will produce different hash values, so you would need to compare the hashes to see if they matched up.
  • #1
gva
50
1
I got a freeware encryption software with only 128 bit. How fast it is for hackers to crack 128 bit file encryption?
 
Computer science news on Phys.org
  • #3
Greg Bernhardt said:
A long time
http://www.inet2000.com/public/encryption.htm

But in file encryption software, it seems related to the password. For example I just use a 5 letter password.. how's the password related to the 128 bit encryption
 
  • #4
gva said:
But in file encryption software, it seems related to the password. For example I just use a 5 letter password.. how's the password related to the 128 bit encryption
Passwords and the encryption standard (128 bit in this case) have nothing to do with each other. The encryption is done exactly the same way whether you have a 3 character password or a 300 character password.
Hacking an encryption means bypassing the password completely.

Of course, if you use a simple password, then they don't HAVE to crack the encryption, they just figure out your password and then they are in regardless of the encryption being used.
 
  • #5
phinds said:
Passwords and the encryption standard (128 bit in this case) have nothing to do with each other. The encryption is done exactly the same way whether you have a 3 character password or a 300 character password.
Hacking an encryption means bypassing the password completely.

Of course, if you use a simple password, then they don't HAVE to crack the encryption, they just figure out your password and then they are in regardless of the encryption being used.

In an encrypted file, where is the 128 bit key combinations stored? If someone got my file.. can't he decrypt it using other software? Why not?
 
  • #6
Greg Bernhardt said:
A long time
http://www.inet2000.com/public/encryption.htm

What prevents intercepting the key itself?
 
  • #7
It sounds almost old fashioned for hackers to bother to attempt cracking any encryption regardless of key length. Nowadays, they are so good at stealing credentials (accounts, passwords and keys).

If the OP is really interested in security, he must choose a secure key, protect the key, and change the key often.
 
  • #8
GTOM said:
What prevents intercepting the key itself?
It's a private key. It is not transmitted. There is a public key for use in ENcrypting things but only the private key will DEcrypt.
 
  • #9
@gva you're asking a question and I think maybe you do not understand the answers you've gotten so far. Good ciphers are not unbreakable, they are just totally impractical to break. 128 AES is breakable but is still actively used in the ssh 2 protocol. Why? Because nobody is going to spend a week of supercomputer time cracking your email. Too hard. Too expensive. There is way too much low-hanging fruit out there to mess with decoding your cipher. It is economically unfeasible. The only time somebody would bother is in the realm of espionage.

Read this insight article: https://www.physicsforums.com/insights/perfect-secrecy-unbreakable-cipher

And then see if you can understand what has been said.
 
  • #10
jim mcnamara said:
@gva 128 AES is breakable but is still actively used in the ssh 2 protocol. Why? Because nobody is going to spend a week of supercomputer time cracking your email.
Jim, according to what I have read, if computers get 1,000,000 times faster than they are today it would still take longer than the current age of the universe to brute force hack a 128 bit code
 
  • #11
Does any have any link how exactly file encryption works. Where is the key stored.. is it in the program or in the file. And can't someone just read the key from the file directly and decrypt it? Also can't the password be hacked directly from the file?
 
  • #12
Hey gva.

In symmetric encryption you generate the key from data - like a password.

What often happens is that the password in memory is converted to the key and everything "checks out" (i.e. the information looks to be in the correct format and organizational structure) then the program assumes it's good and it uses the data.

There are additional things like hashes that get a fingerprint of the data and if the decryption process is successful then the hash will give evidence of that.

You don't store the private key for password data - it's up to you to generate it after you enter your password.
 
  • #13
Hey gva, there's something else you need to know about your passwords, and that is, it is they, that get stretched to be the size of your key.

so if your password is 'abc' and its stretched using, say, md5, it becomes a key, a string like d41d8cd98f00b204e9800998ecf8427e which has those 128 bits your software then feeds into the encryption algo along with your data.

that mean if another program uses a different key-stretching method from yours, it becomes true that the result will likely be unbreakable.

now, being in a world of standards and best practices, its fairly certain one needs to try just a few stretch algo's against the massive lists of stolen passwords to have a fairly realistic chance of brute-forcing your key in fairly reasonable times.

as your key is the weak thing here, one typically uses an easy password and a random file to set-up a key-store. there you keep the list of your passwords - but these passwords are now generated to be wacky almost untypeable and certainly unmemorable strings like, for example, 'Yg__E9-N8vdP9nQcL' which has 100 bits of randomness and is almost certain to never have been used before.

such a wacky password, stored in a password manager, can then be used to store and share encrypted data since whatever the key-stretcher does, its output will be even less likely to be something one could brute-force.

--
i use KeePassX to generate and track my passwords because it runs on all operating systems. .. and i use it in the following weird way: i have a simple password on my keepass database. that's because i also use a key-file that works in tandem with my password to give me access to the passwords. the rule here is: something i know + something i have.

about once a month i open another copy of a keepass database, one which has as its key a phrase from a book which all my family members have. i don't have that book at home, but i have a note in my effects which identifies the phrase (but not the book). weird, ok? the next step is that i read my 'daily use' password files as well as any keyfiles i might have - into the monthly version of the password database and post it publicly so that i can get to it from anywhere.

TL:DR; this pov so you have an idea of what you might want to be doing in a few years. For now use long random-like passwords, write them down, messed up a little bit, and keep them in your wallet.
 
  • #14
@phinds Actually I was parroting something I read about getting ahead of the curve on encryption with regard to quantum computing. And fudging it.
My bad. The OP seemed really uninformed, so I took a pot shot with a wrong analogy.

You are correct - right now breaking most decent ciphers directly is very impractical, to say the least. That's why backdoors and other methods of hacking are more productive approaches.
 
  • Like
Likes phinds
  • #15
phinds said:
Jim, according to what I have read, if computers get 1,000,000 times faster than they are today it would still take longer than the current age of the universe to brute force hack a 128 bit code

That of course, assumes that brute force is the only way. If they intercept the key what prevents reverting encryption steps to decrypt?
If there is another key, it still has to be transmitted between two different systems.
 
  • #16
phinds said:
It's a private key. It is not transmitted. There is a public key for use in ENcrypting things but only the private key will DEcrypt.

Surely if you know how to ENcrypt it, you know how to DEcrypt it? You just do it in reverse?
 
  • #17
It depends on the algorithm.

If it is something like RSA (like where factoring is the difficulty) then it's determined by how well you undo these problems that are meant to be easy to do but hard to undo unless you have the right piece of information (like a key).

This is known as one way functions in cryptography and they depend on how good the algorithms are to actually do the "undo-ing" without the necessary information that would make it easy.
 
  • Like
Likes Clever Penguin
  • #18
GTOM said:
That of course, assumes that brute force is the only way.
No, it is simply a statement of fact about brute force hacking. It makes no assumptions at all and has nothing to do with other methods.
 

1. How long does it take for hackers to crack 128 bit file encryption?

The exact time it takes for hackers to crack 128 bit file encryption varies depending on several factors such as the strength of the encryption algorithm, the computing power of the hacker, and the methods used to attempt to crack the encryption. However, a 128 bit encryption key is considered extremely secure and can take billions of years for hackers to crack through brute force methods.

2. Can hackers crack 128 bit file encryption at all?

In theory, any encryption algorithm can be cracked given enough time and resources. However, 128 bit encryption is considered highly secure and the probability of hackers successfully cracking it is extremely low. It is widely used by governments, financial institutions, and other organizations to protect sensitive information.

3. Are there any ways to speed up the process of cracking 128 bit encryption?

Yes, there are some techniques that hackers can use to potentially speed up the process of cracking 128 bit encryption. These include using more advanced computing hardware, exploiting vulnerabilities in the encryption algorithm, or using social engineering to obtain the encryption key. However, these methods are not foolproof and can still take a significant amount of time to successfully crack the encryption.

4. Can 128 bit file encryption be cracked by a single person or does it require a team?

The time it takes to crack 128 bit file encryption can vary depending on the computing power available. It is theoretically possible for a single person to crack the encryption, but it would likely take an extremely long time. It is more common for hackers to work in teams and use multiple computers to speed up the process.

5. How can I ensure the security of my data against potential hackers?

To ensure the security of your data against potential hackers, it is important to use strong encryption algorithms such as 128 bit encryption. It is also crucial to regularly update and strengthen your encryption keys, use secure passwords, and implement other security measures such as firewalls and antivirus software. It is also recommended to regularly back up your data in case of a successful hack attempt.

Similar threads

  • Computing and Technology
Replies
27
Views
1K
  • Computing and Technology
Replies
34
Views
6K
  • Computing and Technology
Replies
15
Views
1K
  • Computing and Technology
Replies
27
Views
12K
Replies
7
Views
2K
  • Computing and Technology
Replies
4
Views
22K
  • Programming and Computer Science
Replies
9
Views
1K
Replies
11
Views
5K
  • Computing and Technology
Replies
3
Views
2K
Replies
6
Views
1K
Back
Top