Crack password to Open Office 2.0 .ods file?
Windows or Linux, doesn't matter. Just really need to remember/brute force this document.
Core i5 2500K / Asus P8P67 / 16 GB DDR3
GTX 580 / Samsung 27"
Intel 320 120GB / Win7Pro64
Aug 14th, 2009 9:00 pm
Aug 17th, 2009 2:18 pm
Aug 17th, 2009 2:33 pm
Aug 17th, 2009 2:36 pm
Aug 17th, 2009 2:53 pm
All the computers on the planet couldn't crack a random 128-bit encryption key this century unless they got very lucky.
Aug 17th, 2009 5:17 pm
Aug 17th, 2009 5:40 pm
http://docs.oasis-open.org/office/v1.1/ ... -v1.1.html
Aug 17th, 2009 7:02 pm
Aug 17th, 2009 7:47 pm
Actually, the latest research from earlier this month shows there may be a problem with 256-bit AES that doesn't exist in 128 or 196 bit keys. It's only a theoretical attack with little or no practical applications. But for better security the latest recommendation is to move to 128 or 196 bit keys.
Even if you took all of the computers in the world and tried to brute force AES, it would likely still take many thousands of years.16. What is the chance that someone could use the "DES Cracker"-like hardware to crack an AES key?
In the late 1990s, specialized "DES Cracker" machines were built that could recover a DES key after a few hours. In other words, by trying possible key values, the hardware could determine which key was used to encrypt a message.
Assuming that one could build a machine that could recover a DES key in a second (i.e., try 2^55 keys per second), then it would take that machine approximately 149 thousand-billion (149 trillion) years to crack a 128-bit AES key. To put that into perspective, the universe is believed to be less than 20 billion years old.
Aug 17th, 2009 11:03 pm
The main reason for switching to 256-bit keys is quantum computing: cracking a 256-bit key on a quantum computer would take a similar amount of time to cracking a 128-bit key on a conventional computer.
Aug 18th, 2009 8:51 pm