Difference between revisions of "Talk:ERF"

From Dragon Age Toolset Wiki
Jump to: navigation, search
 
Line 6: Line 6:
  
 
:: Okay, that would indeed move it into the reasonably brute-forcable range. A very peculiar decision by BioWare... [[User:DocMcCoy|DocMcCoy]] 01:41, 17 March 2011 (UTC)
 
:: Okay, that would indeed move it into the reasonably brute-forcable range. A very peculiar decision by BioWare... [[User:DocMcCoy|DocMcCoy]] 01:41, 17 March 2011 (UTC)
 +
 +
 +
What's the difference between "2 Blowfish" and "3 Blowfish (Dragon Age 2 only)" encryptions? [[User:SergeySW|SergeySW]] 23:40, 30 July 2011 (UTC)

Latest revision as of 00:40, 31 July 2011

Who in their right mind thinks that brute-forcing the Blowfish encryption will take "no more than 1 minute"?

Am I missing something here? As far as I can see, the checksum is the weakest point there. Still, 2^64 md5sum operations (worst-case) to brute-force the password from its checksum will take considerable more time than 1000 years, let alone 1 minute. From what I can see using a quick Google search, even using a dedicated FPGA won't get you into a reasonable time span. DocMcCoy 03:47, 15 March 2011 (UTC)

As far as I can tell, scheme 2 blowfish has a huge restriction on what passwords can be (8 digit passwords), this severely limits what possible passwords there are (100000000 AFAIK?). —Thought Process 00:21, 17 March 2011 (UTC)
Okay, that would indeed move it into the reasonably brute-forcable range. A very peculiar decision by BioWare... DocMcCoy 01:41, 17 March 2011 (UTC)


What's the difference between "2 Blowfish" and "3 Blowfish (Dragon Age 2 only)" encryptions? SergeySW 23:40, 30 July 2011 (UTC)