Submit Hint Search The Forums LinksStatsPollsHeadlinesRSS
14,000 hints and counting!


Click here to return to the 'This just linearly increases the security' hint
The following comments are owned by whoever posted them. This site is not responsible for what they say.
This just linearly increases the security
Authored by: hamarkus on Jan 14, '05 01:08:20PM

If cracking the password on your outermost disk image takes let's say one week, than cracking the password of the second one takes another week.



[ Reply to This | # ]
This just linearly increases the security
Authored by: Tidris on Jan 14, '05 01:45:39PM

Not necessarily. If your first password is "hello", and your second one is "fdhjsaiofhaidhfashfoiwqu8947q49uqwiru89q3wu4r2", then the second password could take much longer to guess than the first one.



[ Reply to This | # ]
This just linearly increases the security
Authored by: foobar104 on Jan 14, '05 02:44:28PM

In that case, the correct course of action would have been to use a strong password the first time.

This hint isn't really useful. Rather, it's just something you can do if you feel like being inconvenienced.



[ Reply to This | # ]
This just linearly increases the security
Authored by: Spades on Jan 16, '05 02:47:45PM

Actually, they're both wrong. From what I know about AES, it's no better than other forms of encryption when it comes to "nesting". If you do AES once, and then do AES again, you haven't strengthened it any. It ends up being encrypted with just another key no stronger than the strongest key in the chain. It could even end up worse than any of the original keys.

In other words, if you combine keys such as "hello" and "qfhejlhfqm8hvaowhgfimahiwuhfcmilwaf", an attacker might be able to decrypt it with a key like "lkjafeuono".

Basically, if you're not a crypto expert, don't go arbitrarily combining crypto systems. It's usually counter-productive.



[ Reply to This | # ]