http://science.slashdot.org/story/10/01/07/1623249/Factorization-of-a-768-Bit-RSA-Modulus RSA-768 was taken from the now obsolete RSA Challenge list as a representative 768-bit RSA modulus. This result is a record for factoring general integers. Factoring a 1024-bit RSA modulus would be about a thousand times harder, and a 768-bit RSA modulus is several thousands times harder to factor than a 512-bit one. Because the first factorization of a 512-bit RSA modulus was reported only a decade ago it is not unreasonable to expect that 1024-bit RSA moduli can be factored well within the next decade So how long would it take a botnet to break rsa 1024? Probably a few years but hey, most botnets are sitting around doing not much these days.
hehehe that one didn't do much. So much for infecting everyone.. Don't know too much on this subject though.
You mean a 128-bit AES key which you can get from 2 seconds of looking at the xex? I dunno man, that might be a little too complicated.
You're not understanding, gabe is referring to retrieving the key from the xex, not randomly guessing it. Xorloser's explanation refers to not reversing it out, but trying random combinations until it works.
5,395,141,535,403,007 billion years is a long ass time, especially considering that it's weakest form of AES. Even taking his computer specs into account, this is such a significant amount of time you might as well look at humans a mere rock on a gravel road of the species that have/will walk this earth.
Thats why the best attacks on encryption are on the implementation. And to clarify my posts above. I was referring to Gabe posting that he could get the key for the Beatles Rockband mogg encryption by looking at the default.xex and that it would only take him about 2 seconds. He even offered to take a look at it thru pms. But he has since given up... And here he said it was such an easy thing.....:katamari: