uk-netmarketing Archive
[Previous] [Next] - [Index] [Thread Index] - [Previous in Thread] [Next in Thread]
Subject: | Re: UKNM: Credit card fraud |
From: | Tom Hukins |
Date: | Mon, 29 Jun 1998 12:16:09 +0100 |
Sajid Mohammed wrote:
>As far as I am aware, the only way to read an encrypted credit card
>number would be to use a 'brute force' technique, which requires a
>vast amount of processing time. I wonder if there are any friendly
>computer science types who could work out how long it would take one
>solitary hacker with a top of the line Pentium to do this? If people
>were made aware of how much time it takes to crack *one* credit card
>number, I am sure their fears would be allayed.
I'm far from being a "computer science type", and I probably wouldn't know
any more if I was, but I'll do my best to answer this:
Brute force is the only way to crack a well-designed, well-implemented
cryptographic algorithm. As has already been noted, early versions of
Netscape used poorly-implemented cryptography. A poorly designed algorithm
would be one which is easily reversible, for example if each letter
corresponds to its position in the alphabet (A -> 01, B -> 02, Z -> 26)
then I can easily decrypt 021515 to BOO.
To get some idea of how tough/easy it is to crack some of the commonly used
crypto algorithms take a look at <http://www.distributed.net/>.
On a related note: There doesn't seem to be much fuss about the
government's proposal for crypto legislation. I really the Internet
industry will try to defeat this dangerous proposal which has been put
forward by people who don't understand what's at stake.
Regards,
Tom
--
Learn how to create amazing web sites
Visit eBORcOM's Web Development Resources
http://www.eborcom.com/webmaker/
Replies
UKNM: EU privacy directive, Steve Bowbrick
[Previous] [Next] - [Index] [Thread Index] - [Next in Thread] [Previous in Thread]