REPUBLICAN controlled House kills bill to limit NSA snooping

Topics that do not fit anywhere else. Absolutely NO discussions of religion, race, or immigration!

Moderators: carlson1, Charles L. Cotton

User avatar
sjfcontrol
Senior Member
Posts: 6267
Joined: Wed Oct 28, 2009 7:14 am
Location: Flint, TX

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by sjfcontrol »

xb12s wrote:
sjfcontrol wrote: If the internet company knows what it's doing, they will be unable to comply with this request, as they don't know the passwords. All that is stored is a "hash" of the password. When the user logs in, he enters the password, which is passed thru the hash algorithm, and compared with the stored hash value. If it matches, the user is logged on. So the only thing the company stores is the hash, and there is no way (well, outside of the NSA, anyway) to recreate the password from only the hash.
From the article it looks like the NSA is looking for the "salt", the algorithm, and the hash and they can come up with the password in a matter of minutes.
But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.
OK, I did say "outside the NSA" ;-)

By the way, if they have the power to brute-force passwords, they don't need the "salt". Salt is used to prevent password 'collisions'. Presume we both are married to women named "Mary", and use our wive's name as a password. If I have access to the file of hashed passwords, I can search for accounts that have the same hash as my account. I'll find your hash matches, and I'll know your password. With salt, everybody gets a random sequence "sprinkled" into the algorithm and my hash will then differ from yours even though our passwords are the same.

All this just goes to prove that passwords are an outdated (and out-technologied) concept. For true security we should all be using public/private certificates to prove our identities. Lets see them crack that in 6-minutes (unless, of course, the NSA has had the developing companies insert back-doors).

By the way, is the NSA brute-forcing passwords in their "high-performance video boards"?
Range Rule: "The front gate lock is not an acceptable target."
Never Forget. Image
User avatar
SQLGeek
Senior Member
Posts: 3269
Joined: Sun Feb 28, 2010 1:48 am
Location: Richmond, TX

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by SQLGeek »

sjfcontrol wrote:
All this just goes to prove that passwords are an outdated (and out-technologied) concept
There is something to be said for two factor authentication.
Psalm 91:2
Dave2
Senior Member
Posts: 3166
Joined: Thu Sep 02, 2010 1:39 am
Location: Bay Area, CA

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by Dave2 »

sjfcontrol wrote:All this just goes to prove that passwords are an outdated (and out-technologied) concept. For true security we should all be using public/private certificates to prove our identities. Lets see them crack that in 6-minutes
IIRC, those are only secure because the numbers involved are so big that it takes so long to factor them that it's not practical to try. As soon as computers speed way up or somebody figures out a better algorithm, they'll be easy to crack. I think.
sjfcontrol wrote:By the way, is the NSA brute-forcing passwords in their "high-performance video boards"?
I'm not aware of any evidence one way or the other, but what's to stop them?
I am not a lawyer, nor have I played one on TV, nor did I stay at a Holiday Inn Express last night, nor should anything I say be taken as legal advice. If it is important that any information be accurate, do not use me as the only source.
User avatar
sjfcontrol
Senior Member
Posts: 6267
Joined: Wed Oct 28, 2009 7:14 am
Location: Flint, TX

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by sjfcontrol »

Dave2 wrote:
sjfcontrol wrote:All this just goes to prove that passwords are an outdated (and out-technologied) concept. For true security we should all be using public/private certificates to prove our identities. Lets see them crack that in 6-minutes
IIRC, those are only secure because the numbers involved are so big that it takes so long to factor them that it's not practical to try. As soon as computers speed way up or somebody figures out a better algorithm, they'll be easy to crack. I think.
sjfcontrol wrote:By the way, is the NSA brute-forcing passwords in their "high-performance video boards"?
I'm not aware of any evidence one way or the other, but what's to stop them?
I was commenting on the quote that said computers with high-performance video cards were especially good at cracking passwords. The video cards have nothing to do with how many passwords can be tested per second -- unless they are displaying each result on the screen. :smilelol5:

By the way 6 minutes may not seem like long if they want YOUR password, but consider that at that rate it would take almost 3500 years to crack just one password for each person in the U.S. And that is the kind of thing the NSA seems to want to do.
Range Rule: "The front gate lock is not an acceptable target."
Never Forget. Image
User avatar
mewalke
Senior Member
Posts: 293
Joined: Mon Apr 01, 2013 10:39 am
Location: Denton County, TX

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by mewalke »

sjfcontrol wrote: I was commenting on the quote that said computers with high-performance video cards were especially good at cracking passwords. The video cards have nothing to do with how many passwords can be tested per second -- unless they are displaying each result on the screen. :smilelol5:

By the way 6 minutes may not seem like long if they want YOUR password, but consider that at that rate it would take almost 3500 years to crack just one password for each person in the U.S. And that is the kind of thing the NSA seems to want to do.
Actually, GPUs on video cards are very good at the operations necessary to crack passwords and they can be strung together with the specific purpose to run brute force attacks without having to give up processing time for overhead etc...
User avatar
VMI77
Senior Member
Posts: 6096
Joined: Tue Jun 29, 2010 5:49 pm
Location: Victoria, Texas

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by VMI77 »

If they wanted to see someone's emails in a legitimate investigation they'd get a warrant for access to whatever was in the account they wanted to look at. One big purpose of obtaining passwords this way is to surreptitiously access accounts so they can use them. Now why would they want to do that? Only one reason: to impersonate the user. If they get any passwords this way they're using them to instigate, not investigate.
"Journalism, n. A job for people who flunked out of STEM courses, enjoy making up stories, and have no detectable integrity or morals."

From the WeaponsMan blog, weaponsman.com
User avatar
mewalke
Senior Member
Posts: 293
Joined: Mon Apr 01, 2013 10:39 am
Location: Denton County, TX

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by mewalke »

Regarding passwords and susceptibility to brute force. I don't know where the article got its info, but I'm having a hard time getting for the 6 minute figure for a randomly generated 14 character password - even at the 300+ billion guesses per second.

A good article on password entropy (for random passwords) is here:

http://blog.shay.co/password-entropy/

Following that logic, the 20+ character passwords I use would still take the NSA a long time to crack, even at 300 billion guesses per second.
User avatar
sjfcontrol
Senior Member
Posts: 6267
Joined: Wed Oct 28, 2009 7:14 am
Location: Flint, TX

Re: REPUBLICAN controlled House kills bill to limit NSA snoo

Post by sjfcontrol »

mewalke wrote:Regarding passwords and susceptibility to brute force. I don't know where the article got its info, but I'm having a hard time getting for the 6 minute figure for a randomly generated 14 character password - even at the 300+ billion guesses per second.

A good article on password entropy (for random passwords) is here:

http://blog.shay.co/password-entropy/

Following that logic, the 20+ character passwords I use would still take the NSA a long time to crack, even at 300 billion guesses per second.

I get all my password security advice from Ellen Degeneres...

[youtube]http://youtube.com/watch?v=Srh_TV_J144[/youtube]
Range Rule: "The front gate lock is not an acceptable target."
Never Forget. Image
Post Reply

Return to “Off-Topic”