TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Becoming physically immune to brute-force attacks (2021)

109 点作者 emurlin7 个月前

16 条评论

ryankrage776 个月前
The premise reminds of discussions of computing in Ra. <a href="https:&#x2F;&#x2F;qntm.org&#x2F;aum" rel="nofollow">https:&#x2F;&#x2F;qntm.org&#x2F;aum</a><p>&gt; &quot;Don&#x27;t talk about the future,&quot; Vidyasagar says.<p>&gt; &quot;What? Why not?&quot;<p>&gt; &quot;Look at this computer,&quot; Vidyasagar says, gesturing at the mainframe. &quot;Computers are getting more powerful, yes?&quot;<p>&gt; &quot;Sure.&quot;<p>&gt; &quot;What is the most powerful computer that will be built? Ever. Not this year. Not this decade. What computer will be the most powerful? And how powerful will it be? And how big?&quot;<p>&gt; Hatt thinks on this for ten long seconds. He opens his mouth, but never actually forms a word. The scale of the question is beyond him.<p>&gt; Vidyasagar says to him, &quot;No matter what you say, you will look like a fool. Every statement about the future turns out to be foolish.&quot;
评论 #41973960 未加载
评论 #41970495 未加载
评论 #41986650 未加载
评论 #41970878 未加载
kragen6 个月前
I could be wrong (my physics background isn&#x27;t that strong either) but I think Dyson&#x27;s &quot;time without end&quot; paper <a href="http:&#x2F;&#x2F;www.aleph.se&#x2F;Trans&#x2F;Global&#x2F;Omega&#x2F;dyson.txt" rel="nofollow">http:&#x2F;&#x2F;www.aleph.se&#x2F;Trans&#x2F;Global&#x2F;Omega&#x2F;dyson.txt</a> shows that eventually the universe will cool down enough to make all keys brute-force-attackable despite Bremermann&#x27;s limit.<p>Given a finite amount of attacker computation you&#x27;re willing to defend against, you can get a real advantage from key stretching (though not from mere salting). If you want a password strength of 256 bits, you can memorize a password of 226 bits and require work equivalent to 2³⁰ key-hashing operations to derive the actual encryption key or crypted password. This is normally called a KDF; reasonable ones are scrypt, bcrypt, and Argon2, in ascending order of goodness.<p>If you make the work factor unreasonably large, you won&#x27;t be able to use the password in practice, because you have to do that work every time you use it. For example, if you try to memorize 170 bits of password and use a 2¹⁷⁰ work factor in your KDF to reach the 340-bit security level, recommended here, you have to do 2¹⁷⁰ work on your laptop every time you log in. Assuming a trillion operations per second (a safe upper bound for current laptops) each login will take about 47 nonillion years, about a sextillion times longer than the history of the universe so far and about 50 times longer than the expected lifetime of the last galaxies (see <a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Timeline_of_the_far_future" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Timeline_of_the_far_future</a>). It may be inconvenient to wait that long.<p>For the same reason that a KDF is a safe way to derive keys for decrypting data at rest, in a client-server system, you can generally do this work on the client safely, so it doesn&#x27;t pose a denial-of-service risk.
评论 #41968605 未加载
edweis6 个月前
&gt; A password with 327 bits of entropy is nearly impossible to crack even if you burn the whole observable universe trying to do so.<p>This is exactly the question I was asking me when starting the article, and it is answered perfectly.
red_admiral6 个月前
There&#x27;s an older version of this argument in Schneier&#x27;s Applied Cryptography (1996). He also concludes that a 256-bit key is secure &quot;until computers are made from something other than matter and consume something other than energy&quot;, IIRC.<p>However, despite things like Ed25519 using 512-bit curve points for 256-bit security (you lose a factor 2 off your exponent because math), this particular instantiation fails much harder if a quantum computer running Shor&#x27;s algorithm ever becomes reality.<p>Meanwhile, 123456 still tops the password charts wherever it is allowed.
评论 #41974274 未加载
contravariant6 个月前
This is probably a decent estimate, but there&#x27;s a couple of routes of attack it fails to account for.<p>First it uses the <i>current</i> average temperature of the universe. Lowering the temperature can be done by just waiting a while before turning the machine on. I assume that powering a sufficiently powerful fridge is not an option, given the origin of the theoretical limit, but I can&#x27;t quite point out <i>why</i> it wouldn&#x27;t work.<p>Secondly it assumes that an unsuccessful attempt must flip at least some bits in an semi-permanent manner. This is obviously true of all current computers, but doesn&#x27;t <i>have</i> to be true for all possible apparatuses. A specialized hyper-efficient password cracking system should be <i>expected</i> to get below this limit. Will we ever build one? Who knows.<p>Arguably this latter &#x27;loop-hole&#x27; is just pointing out that quantum computers or more efficient algorithms could do better, so maybe we should absorb it into the definition of &#x27;brute-force&#x27;.
评论 #41967320 未加载
nusl6 个月前
&gt; An excerpt from a religious text with a trailing space:<p>&gt; &quot;I&#x27;d just like to interject for a moment. What you’re referring to as Linux, is in fact, GNU&#x2F;Linux,&quot;
ambicapter6 个月前
Is this proof that the universe cannot understand itself? It seems weird that there can be a set of information in the universe that can be hidden from the rest of the universe.
评论 #41968842 未加载
评论 #41970834 未加载
评论 #41968989 未加载
评论 #41968492 未加载
评论 #41968355 未加载
shaftoe4447 个月前
I thought this would be about deadlifting.
评论 #41966798 未加载
评论 #41966783 未加载
maxbond6 个月前
I can&#x27;t say I understood and evaluated all the physics here (I skimmed parts) but I was pretty surprised by how small the estimate was. I would&#x27;ve assumed that, were we to have one or two thousand years more cryptographic history, we&#x27;d end up using ginormous keys (maybe on the order of 1 MiB?). But this suggests that 512 or 1024 bits might be all we need.
评论 #41968082 未加载
评论 #41969036 未加载
TacticalCoder7 个月前
Speaking of physically immune schemes, I remember some protocol which relied on a gigantic amount of data present behind a link that was, on purpose, very low bandwidth (physically low bandwidth: not by software as in rate limitation. That was the whole point: the link was physically low bandwidth).<p>So the data was impossible to exfiltrate remotely: it simply wasn&#x27;t physically possible to do remotely (it would be way too slow).<p>I forgot the name and what the data was used to protect&#x2F;derive: maybe some authentication scheme?<p>Anyone knows what I could be talking about? I&#x27;m pretty sure I saw that posted here on HN in the past.
评论 #41966892 未加载
评论 #41967179 未加载
Mathnerd3146 个月前
It doesn&#x27;t account for quantum computing? Cracking passwords seems like one of those things that should get an exponential speedup with quantum computing.
评论 #41967111 未加载
评论 #41967445 未加载
AlienRobot6 个月前
This assumes E = mc^2.<p>What if it&#x27;s E = mc^2 + AI?
spacebanana77 个月前
I suspect this can be bypassed with knowledge about the size of the target system.<p>Intuitively, there are a finite number of passwords that can be stored on earth, so a large enough system should be able to enumerate them? Whilst also existing in the observable universe.
评论 #41966838 未加载
评论 #41967781 未加载
评论 #41966807 未加载
stall847 个月前
Loving reading this but.. &#x27;TLDR - at the bottom&#x27; is wicked
评论 #41967124 未加载
paulpauper6 个月前
you don&#x27;t need such complicated and hard to remember passwords--use something like bcrypt
评论 #41974208 未加载
yayitswei7 个月前
Now do the wrench attack.
评论 #41967740 未加载
评论 #41967051 未加载
评论 #41967457 未加载
评论 #41967430 未加载