[過去ログ] 【セキュリティ】複雑な8文字のパスワードでも、MD5ハッシュだとGeForce RTX 4090で1時間以内に解読されてしまう [すらいむ★] (128レス)
1-

このスレッドは過去ログ倉庫に格納されています。
次スレ検索 歴削→次スレ 栞削→次スレ 過去ログメニュー
47
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 20:10:11.26 ID:NlREUSDy(3/8) AAS
>>45
?

マジで言ってるの?
48: 社説+で新規スレ立て人募集中 2024/05/05(日) 20:13:13.60 ID:Ps0rElYu(1) AAS
大量のダミーの中に破壊ウイルス仕込む以外にない
49
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 20:14:19.39 ID:L0gRl4b0(5/11) AAS
>>46
>具体例で「簡単でしょう?」って示して
>素人にも納得させるのは意味があるでしょう

それが、

>>41
>1998年に実証されたDESへの総当たり攻撃

だ、馬鹿

>>47
死ね
50
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 20:26:02.72 ID:NlREUSDy(4/8) AAS
>>49
反論できないねw
51
(2): 社説+で新規スレ立て人募集中 2024/05/05(日) 20:37:49.29 ID:EhRhGSjH(1) AAS
もう生体認証組み合わせないと駄目だな
52
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 20:49:55.24 ID:L0gRl4b0(6/11) AAS
>>50
お前のが論になってないから、そりゃあwwwww

ってか、たかだか総当たりの話で、なんでこんな池沼だらけなのやら
53: 社説+で新規スレ立て人募集中 2024/05/05(日) 20:57:54.72 ID:M4yG94pv(1) AAS
>>51
生体認証はけっこうザル
54
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 20:59:41.62 ID:NlREUSDy(5/8) AAS
>>52
で、RTX4090でsha256が1時間で解けるの?
55: 社説+で新規スレ立て人募集中 2024/05/05(日) 21:07:47.61 ID:1B7EVIqA(1/3) AAS
>>51
2段認証でOK
56
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 21:52:54.44 ID:L0gRl4b0(7/11) AAS
>>54
>>43
57: 社説+で新規スレ立て人募集中 2024/05/05(日) 22:06:41.12 ID:NlREUSDy(6/8) AAS
>>56
やっぱり反論できないじゃんw
58: 社説+で新規スレ立て人募集中 2024/05/05(日) 22:15:10.19 ID:ZWWbAvmx(1/3) AAS
2023.08!!!!

This post analyzes and compares the security of SHA256, SHA512 and MD5 hash algorithms. It finds SHA512 to be the most cryptographically secure hash overall, with SHA256 a close second, and MD5 considered broken.
59: 社説+で新規スレ立て人募集中 2024/05/05(日) 22:17:13.82 ID:L0gRl4b0(8/11) AAS
馬鹿がID変えたのは、わかった、ほんと救いようのない馬鹿だな
60: 社説+で新規スレ立て人募集中 2024/05/05(日) 22:17:22.63 ID:ZWWbAvmx(2/3) AAS
Reasons why SHA512 is superior to MD5

Asked 14 years, 3 months ago
61: 社説+で新規スレ立て人募集中 2024/05/05(日) 22:19:43.40 ID:ZWWbAvmx(3/3) AAS
MD5, or Message-Digest Algorithm 5, creates a 128-bit hash value. This is like creating a unique fingerprint that is 128 characters long. It's powerful, but it's not perfect. In fact, MD5 has been found to have vulnerabilities that could allow someone to create two different pieces of data with the same hash value. That's a no-no in digital forensics!

On the other hand, SHA-1, or Secure Hash Algorithm 1, creates a 160-bit hash value. That's a fingerprint that is 160 characters long! SHA-1 is considered more secure than MD5, but it also has vulnerabilities. In fact, experts recommend moving to even stronger hash functions like SHA-256 or SHA-3 for critical applications.

So, which hash function should you use? Well, it depends on your specific needs. If you're dealing with less critical data and need to save on processing power, MD5 might be sufficient. But if you're dealing with sensitive data that needs the highest level of protection, consider using SHA-256 or SHA-3. Remember, the choice of hash function could mean the difference between catching a criminal and letting them slip through your fingers.
62: 社説+で新規スレ立て人募集中 2024/05/05(日) 22:25:16.92 ID:f2Vd3ius(1/2) AAS
SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits:[5] SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256. SHA-256 and SHA-512 are novel hash functions computed with eight 32-bit and 64-bit words, respectively. They use different shift amounts and additive constants, but their structures are otherwise virtually identical, differing only in the number of rounds. SHA-224 and SHA-384 are truncated versions of SHA-256 and SHA-512 respectively, computed with different initial values. SHA-512/224 and SHA-512/256 are also truncated versions of SHA-512, but the initial values are generated using the method described in Federal Information Processing Standards (FIPS) PUB 180-4.
SHA-2 was first published by the National Institute of Standards and Technology (NIST) as a U.S. federal standard. The SHA-2 family of algorithms are patented in the U.S.[6] The United States has released the patent under a royalty-free license.[5]
As of 2011, the best public attacks break preimage resistance for 52 out of 64 rounds of SHA-256 or 57 out of 80 rounds of SHA-512, and collision resistance for 46 out of 64 rounds of SHA-256.[1][2]
63: 社説+で新規スレ立て人募集中 2024/05/05(日) 22:26:52.98 ID:f2Vd3ius(2/2) AAS
SHA-3 (Secure Hash Algorithm 3) is the latest[4] member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015.[5][6][7] Although part of the same series of standards, SHA-3 is internally different from the MD5-like structure of SHA-1 and SHA-2.
64
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 22:28:46.21 ID:L0gRl4b0(9/11) AAS
ID変えつつ、何の関係もない英文貼り続けるって、こりゃあ、馬鹿ってより、気違いだな
65
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 22:31:23.63 ID:NlREUSDy(7/8) AAS
>>64
IDが違うというのは別人って可能性を考えよう
どうせ反論できんけどw
他人からは君が逃げ回っているのがよく分かる
66
(1): 社説+で新規スレ立て人募集中 2024/05/05(日) 22:34:04.27 ID:YQJoUbKE(1) AAS
回数制限あるのなら無理でしょ?
1-
あと 62 レスあります
スレ情報 赤レス抽出 画像レス抽出 歴の未読スレ AAサムネイル

ぬこの手 ぬこTOP 0.008s