The Official Forum  

Go Back   The Official Forum > Basketball
Register FAQ Community Calendar Today's Posts Search

Reply
 
LinkBack Thread Tools Rate Thread Display Modes
  #1 (permalink)  
Old Sat Jan 10, 2015, 01:05am
beware big brother
 
Join Date: Mar 2012
Location: illinois
Posts: 996
Quote:
Originally Posted by Camron Rust View Post
I could give you my password in the transformed format and, even if you had a powerful computer working on it for years, you'd never be able to figure out the original password....even if you knew the exact algorithm I used to transform it.
I find the bolded, underlined part very hard to believe, especially if the process is repeatable such that each time you enter the same sequence of letters, numbers, and symbols, they get converted into the exact same sequence of new letters, numbers, and symbols over and over again. It would not take a human cryptographer years to break that system, let alone a computer. Even without the algorithm, if you have access to multiple passwords and what they are converted to, it would not take that long to determine the algorithm.
Reply With Quote
  #2 (permalink)  
Old Sat Jan 10, 2015, 05:16am
Official Forum Member
 
Join Date: Aug 1999
Location: In the offseason.
Posts: 12,263
Quote:
Originally Posted by johnny d View Post
I find the bolded, underlined part very hard to believe, especially if the process is repeatable such that each time you enter the same sequence of letters, numbers, and symbols, they get converted into the exact same sequence of new letters, numbers, and symbols over and over again. It would not take a human cryptographer years to break that system, let alone a computer. Even without the algorithm, if you have access to multiple passwords and what they are converted to, it would not take that long to determine the algorithm.
Well, it can possibly be done but you will not be alive to see it done.

The algorithms are published. Even having them and knowing which one was used (as long it is a decent one) really doesn't help much. The math to go backwards from the hashed output to the original input is just too hard for even the best computers to execute in any amount of time that matters.

The typical way cracking works is to use social engineering to guess at what the person might use as a password and try different things until you get it right. They might also just try all combinations of letter, numbers, symbols, etc. until they get the match.

The problem with that is that any decent system will detect repeat failed attempts and just lock the account. So, to have any chance, the hacker needs to obtain a copy of the database so they can run the tests outside of the system. Once the figure it out, they can then use it to break into the account(s).

The hashing algorithms are, however, sufficiently complicated that it just takes too long for it to work well, if at all, as long as you don't use abc123 as your password.

Some older hashing systems have been partially broken but it takes a lot of time with some really powerful computers (ones too expensive for all but big businesses or the government to afford) to get there.

Here is an article that talks about a common encryption technique and how long it would take to crack it:
http://www.eetimes.com/document.asp?doc_id=1279619

Here is a quote from the article:

Quote:
As shown above, even with a supercomputer, it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. This is more than the age of the universe (13.75 billion years). If one were to assume that a computing system existed that could recover a DES key in a second, it would still take that same machine approximately 149 trillion years to crack a 128-bit AES key.
Most breaches in passwords are due to them either being stored in plain text or simply encrypted but the thief finds the encryption key and is able to decrypt them. Hashes, on the other hand, don't have such a key. They are just not practically reversible to get the original password.
__________________
Owner/Developer of RefTown.com
Commissioner, Portland Basketball Officials Association

Last edited by Camron Rust; Sat Jan 10, 2015 at 05:19am.
Reply With Quote
  #3 (permalink)  
Old Sat Jan 10, 2015, 03:49pm
Official Forum Member
 
Join Date: Mar 2014
Posts: 121
Salt please

Quote:
Originally Posted by Camron Rust View Post
Well, it can possibly be done but you will not be alive to see it done.

The algorithms are published. Even having them and knowing which one was used (as long it is a decent one) really doesn't help much. The math to go backwards from the hashed output to the original input is just too hard for even the best computers to execute in any amount of time that matters.

The typical way cracking works is to use social engineering to guess at what the person might use as a password and try different things until you get it right. They might also just try all combinations of letter, numbers, symbols, etc. until they get the match.

The problem with that is that any decent system will detect repeat failed attempts and just lock the account. So, to have any chance, the hacker needs to obtain a copy of the database so they can run the tests outside of the system. Once the figure it out, they can then use it to break into the account(s).

The hashing algorithms are, however, sufficiently complicated that it just takes too long for it to work well, if at all, as long as you don't use abc123 as your password.

Some older hashing systems have been partially broken but it takes a lot of time with some really powerful computers (ones too expensive for all but big businesses or the government to afford) to get there.

Here is an article that talks about a common encryption technique and how long it would take to crack it:
http://www.eetimes.com/document.asp?doc_id=1279619

Here is a quote from the article:



Most breaches in passwords are due to them either being stored in plain text or simply encrypted but the thief finds the encryption key and is able to decrypt them. Hashes, on the other hand, don't have such a key. They are just not practically reversible to get the original password.
Unless you're salting the hash as well, you are suceptible to rainbow tables to figure out the hashed values.
Reply With Quote
  #4 (permalink)  
Old Sat Jan 10, 2015, 05:20pm
Official Forum Member
 
Join Date: Aug 1999
Location: In the offseason.
Posts: 12,263
Quote:
Originally Posted by RefCT View Post
Unless you're salting the hash as well, you are suceptible to rainbow tables to figure out the hashed values.
Indeed...salts dramatically improve it....but how deep do we want to go on this topic on a referee board. Probably too deep already.
__________________
Owner/Developer of RefTown.com
Commissioner, Portland Basketball Officials Association
Reply With Quote
  #5 (permalink)  
Old Sat Jan 10, 2015, 06:06pm
Official Forum Member
 
Join Date: Mar 2014
Posts: 121
Agree

Quote:
Originally Posted by Camron Rust View Post
Indeed...salts dramatically improve it....but how deep do we want to go on this topic on a referee board. Probably too deep already.
Absolutely correct. I am hoping someone from Arbiter reads this since they don't seem to know what they are doing over there. Password encryption is the least of the basic technical issues I have seen. A classic case off growing too big too quickly.
Reply With Quote
  #6 (permalink)  
Old Sun Jan 11, 2015, 12:02am
Administrator
 
Join Date: Sep 1999
Location: Toledo, Ohio, U.S.A.
Posts: 8,141
I am getting goose bumps reading all these posts about mathematics, algorithms, and encryption codes.

MTD, Sr.
__________________
Mark T. DeNucci, Sr.
Trumbull Co. (Warren, Ohio) Bkb. Off. Assn.
Wood Co. (Bowling Green, Ohio) Bkb. Off. Assn.
Ohio Assn. of Basketball Officials
International Assn. of Approved Bkb. Officials
Ohio High School Athletic Association
Toledo, Ohio

Last edited by Mark T. DeNucci, Sr.; Sun Jan 11, 2015 at 01:15am. Reason: Corrected grammar.
Reply With Quote
  #7 (permalink)  
Old Sun Jan 11, 2015, 01:03am
Official Forum Member
 
Join Date: Aug 1999
Location: In the offseason.
Posts: 12,263
Quote:
Originally Posted by RefCT View Post
Absolutely correct. I am hoping someone from Arbiter reads this since they don't seem to know what they are doing over there. Password encryption is the least of the basic technical issues I have seen. A classic case off growing too big too quickly.
I'm hoping they don't read it...and people move to my product as a result!
__________________
Owner/Developer of RefTown.com
Commissioner, Portland Basketball Officials Association
Reply With Quote
  #8 (permalink)  
Old Sun Jan 11, 2015, 01:14am
Administrator
 
Join Date: Sep 1999
Location: Toledo, Ohio, U.S.A.
Posts: 8,141
Quote:
Originally Posted by Camron Rust View Post
I'm hoping they don't read it...and people move to my product as a result!

Good one.

MTD, Sr.
__________________
Mark T. DeNucci, Sr.
Trumbull Co. (Warren, Ohio) Bkb. Off. Assn.
Wood Co. (Bowling Green, Ohio) Bkb. Off. Assn.
Ohio Assn. of Basketball Officials
International Assn. of Approved Bkb. Officials
Ohio High School Athletic Association
Toledo, Ohio
Reply With Quote
  #9 (permalink)  
Old Fri Apr 10, 2015, 09:09am
Official Forum Member
 
Join Date: Sep 2003
Location: Katy, Texas
Posts: 8,033
Quote:
Originally Posted by johnny d View Post
I find the bolded, underlined part very hard to believe, especially if the process is repeatable such that each time you enter the same sequence of letters, numbers, and symbols, they get converted into the exact same sequence of new letters, numbers, and symbols over and over again. It would not take a human cryptographer years to break that system, let alone a computer. Even without the algorithm, if you have access to multiple passwords and what they are converted to, it would not take that long to determine the algorithm.
Let me simplify greatly (it's not THIS easy, but it illustrates the issue)...

What is 6x6? 36
What is 4x9? 36
What is 2x18? 36

If I told you that the question (algorithm) was AxB, and told you the answer (encryption) was 36 ... can you tell me, for sure, what A and B is? No.
__________________
I was thinking of the immortal words of Socrates, who said, 'I drank what?'”

West Houston Mike
Reply With Quote
  #10 (permalink)  
Old Fri Apr 10, 2015, 10:04am
(Something hilarious)
 
Join Date: Jan 2006
Location: These United States
Posts: 1,162
Quote:
Originally Posted by MD Longhorn View Post
Let me simplify greatly (it's not THIS easy, but it illustrates the issue)...

What is 6x6? 36
What is 4x9? 36
What is 2x18? 36

If I told you that the question (algorithm) was AxB, and told you the answer (encryption) was 36 ... can you tell me, for sure, what A and B is? No.
I was told there wouldn't be any math.
__________________
I can't remember the last time I wasn't at least kind-of tired.
Reply With Quote
  #11 (permalink)  
Old Fri Apr 10, 2015, 11:56am
rsl rsl is offline
Official Forum Member
 
Join Date: Oct 2008
Posts: 301
Quote:
Originally Posted by HawkeyeCubP View Post
I was told there wouldn't be any math.
Come on, this the first post in my many years reading the forum that I may know as much about the topic as Bob. But I will still listen to him- always listen to Bob!
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Flaw in rules? largeone59 Football 17 Sun Jan 15, 2006 09:28pm
Flaw in new loss of down rule! ljudge Football 12 Tue Sep 06, 2005 02:21pm


All times are GMT -5. The time now is 12:15pm.



Search Engine Friendly URLs by vBSEO 3.3.0 RC1