• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

TelsaCrypt 4.0

Joined
Dec 13, 2011
Messages
433 (0.10/day)
Processor Core i5 3470 (3.20 GHZ)
Cooling Intel OC27vv
Memory 16 GB DDR3 667mhz
Video Card(s) XFX Radeon HD 5670
Storage Seagate - 500GB | 7200RPM | 32MB Cache | Sata-3G
Display(s) BenQ RL2455
Case Dell Tower
Audio Device(s) On-board
Power Supply Corsair 600w
I read that this variant is impossible to decode/decrypt because the encryption key/public key/password hash is deleted after being sent to a specific. A very knowledgeable computer person said that's not true! The password can still be obtain with a powerful enough GPU. Is he right or wrong? From my understanding, it wouldn't be possible because it has nothing to compare a password to?
 
Joined
Oct 24, 2004
Messages
1,294 (0.18/day)
i guess he's right : look at Apple and the FBI fool game, the later claim to be able to brute force apple's protection.

Depends if you can line up thousands of CPU/GPU to achieve the brute force !
 
Joined
Dec 13, 2011
Messages
433 (0.10/day)
Processor Core i5 3470 (3.20 GHZ)
Cooling Intel OC27vv
Memory 16 GB DDR3 667mhz
Video Card(s) XFX Radeon HD 5670
Storage Seagate - 500GB | 7200RPM | 32MB Cache | Sata-3G
Display(s) BenQ RL2455
Case Dell Tower
Audio Device(s) On-board
Power Supply Corsair 600w
So basically if you can't your hands on equipment like that its theoretically impossible?
 

newtekie1

Semi-Retired Folder
Joined
Nov 22, 2005
Messages
28,472 (4.23/day)
Location
Indiana, USA
Processor Intel Core i7 10850K@5.2GHz
Motherboard AsRock Z470 Taichi
Cooling Corsair H115i Pro w/ Noctua NF-A14 Fans
Memory 32GB DDR4-3600
Video Card(s) RTX 2070 Super
Storage 500GB SX8200 Pro + 8TB with 1TB SSD Cache
Display(s) Acer Nitro VG280K 4K 28"
Case Fractal Design Define S
Audio Device(s) Onboard is good enough for me
Power Supply eVGA SuperNOVA 1000w G3
Software Windows 10 Pro x64
Any encryption can be brute forced, it is just a matter of how long it will take. The encryption used by TeslsaCrypt is 4096-bit encryption. Theoretically it is possible to crack, but there isn't enough computer hardware in the world to do it in a reasonable amount of time.
 

Ahhzz

Moderator
Staff member
Joined
Feb 27, 2008
Messages
8,744 (1.48/day)
System Name OrangeHaze / Silence
Processor i7-13700KF / i5-10400 /
Motherboard ROG STRIX Z690-E / MSI Z490 A-Pro Motherboard
Cooling Corsair H75 / TT ToughAir 510
Memory 64Gb GSkill Trident Z5 / 32GB Team Dark Za 3600
Video Card(s) Palit GeForce RTX 2070 / Sapphire R9 290 Vapor-X 4Gb
Storage Hynix Plat P41 2Tb\Samsung MZVL21 1Tb / Samsung 980 Pro 1Tb
Display(s) 22" Dell Wide/24" Asus
Case Lian Li PC-101 ATX custom mod / Antec Lanboy Air Black & Blue
Audio Device(s) SB Audigy 7.1
Power Supply Corsair Enthusiast TX750
Mouse Logitech G502 Lightspeed Wireless / Logitech G502 Proteus Spectrum
Keyboard K68 RGB — CHERRY® MX Red
Software Win10 Pro \ RIP:Win 7 Ult 64 bit
Absolutely, theoretically. I saw somewhere, a year or so ago, that it would take a "top of the line" (not overclocked, LN2, super-geeked) modern computer approximately 200 years to bruteforce its way thru modern encryption, assuming the answer is all the way at the end of the rainbow"
I don't know what it would take today's newest PCs, with newer bus speeds and substantially more memory available, but it it would still be an extended period of time: however, still theoretically possible.
 
Joined
Dec 13, 2011
Messages
433 (0.10/day)
Processor Core i5 3470 (3.20 GHZ)
Cooling Intel OC27vv
Memory 16 GB DDR3 667mhz
Video Card(s) XFX Radeon HD 5670
Storage Seagate - 500GB | 7200RPM | 32MB Cache | Sata-3G
Display(s) BenQ RL2455
Case Dell Tower
Audio Device(s) On-board
Power Supply Corsair 600w
Okay. I get it now. It's not impossible to brute force, but at the same time, its not very practical.

What are private keys for? The article that I read said that older version left a copy on the victims machine
 
Joined
Nov 4, 2005
Messages
11,691 (1.73/day)
System Name Compy 386
Processor 7800X3D
Motherboard Asus
Cooling Air for now.....
Memory 64 GB DDR5 6400Mhz
Video Card(s) 7900XTX 310 Merc
Storage Samsung 990 2TB, 2 SP 2TB SSDs and over 10TB spinning
Display(s) 56" Samsung 4K HDR
Audio Device(s) ATI HDMI
Mouse Logitech MX518
Keyboard Razer
Software A lot.
Benchmark Scores Its fast. Enough.
To understand encryption and keys you have to understand how they work.

A basic encryption scheme might be something like, shift all alphabet letters one place right, spaces are replaced with a star. Hard to read but not impossible to crack, and they key would be what I just typed, they way to decrypt the text.


Now a high lever overview is, we know of a few algorithms that do a wonderful job of encrypting things, and most are based on a few common parts for the key (though still random supposedly), and the "private" part is something unique to the user, so many easy encryption programs would use something abstract or a user input along with the common key parts and store that key encrypted with a password to keep it safe. The issue becomes if I know the key exists on a machine, and have low level access to the data, I can brute force parts of the key to reduce the time needed to decrypt and the complexity of the encryption to something breakable. The more routine the software runs, for example the first and last parts of the key are the date and time of the encryption, the less has to be known, and the password limits and complexity reduce the amount of effort to steal the key or enough of it to brute strength the rest of the data. So storing the key on the machine can be an issue where low level data access allows for exploitation of the key and thus the data.
 

Ahhzz

Moderator
Staff member
Joined
Feb 27, 2008
Messages
8,744 (1.48/day)
System Name OrangeHaze / Silence
Processor i7-13700KF / i5-10400 /
Motherboard ROG STRIX Z690-E / MSI Z490 A-Pro Motherboard
Cooling Corsair H75 / TT ToughAir 510
Memory 64Gb GSkill Trident Z5 / 32GB Team Dark Za 3600
Video Card(s) Palit GeForce RTX 2070 / Sapphire R9 290 Vapor-X 4Gb
Storage Hynix Plat P41 2Tb\Samsung MZVL21 1Tb / Samsung 980 Pro 1Tb
Display(s) 22" Dell Wide/24" Asus
Case Lian Li PC-101 ATX custom mod / Antec Lanboy Air Black & Blue
Audio Device(s) SB Audigy 7.1
Power Supply Corsair Enthusiast TX750
Mouse Logitech G502 Lightspeed Wireless / Logitech G502 Proteus Spectrum
Keyboard K68 RGB — CHERRY® MX Red
Software Win10 Pro \ RIP:Win 7 Ult 64 bit
A private key is pretty much what it sounds like: the key. It's the random letters and numbers that let the system un-do (decrypt) what was done. There's tons out there that explain it much better than I ever could. If you really get serious, I recommend checking out anything by Bruce Schneier, a god in the field of computer security.
Basically what it meant, was that they locked the door, and then hid the key outside the house somewhere, and then called and said "We've changed the locks, locked your house, and we're the only ones with the new keys! We'll take money to let you back in", and then someone spotted the fake rock in the garden, and found the keys.
 
Joined
Oct 22, 2014
Messages
13,210 (3.80/day)
Location
Sunshine Coast
System Name Black Box
Processor Intel Xeon E3-1260L v5
Motherboard MSI E3 KRAIT Gaming v5
Cooling Tt tower + 120mm Tt fan
Memory G.Skill 16GB 3600 C18
Video Card(s) Asus GTX 970 Mini
Storage Kingston A2000 512Gb NVME
Display(s) AOC 24" Freesync 1m.s. 75Hz
Case Corsair 450D High Air Flow.
Audio Device(s) No need.
Power Supply FSP Aurum 650W
Mouse Yes
Keyboard Of course
Software W10 Pro 64 bit
i guess he's right : look at Apple and the FBI fool game, the later claim to be able to brute force apple's protection.

Depends if you can line up thousands of CPU/GPU to achieve the brute force !
Like disguising it as a crypto mining operation and randomly rewarding participants. :pimp:
 
Joined
Oct 2, 2004
Messages
13,791 (1.93/day)
You can't brute force 100+ character full ASCII passwords. No matter what kind of super computer you're using. Afaik, these crypters use just that. A block of ASCII characters as a password to unlock files.
 

Ahhzz

Moderator
Staff member
Joined
Feb 27, 2008
Messages
8,744 (1.48/day)
System Name OrangeHaze / Silence
Processor i7-13700KF / i5-10400 /
Motherboard ROG STRIX Z690-E / MSI Z490 A-Pro Motherboard
Cooling Corsair H75 / TT ToughAir 510
Memory 64Gb GSkill Trident Z5 / 32GB Team Dark Za 3600
Video Card(s) Palit GeForce RTX 2070 / Sapphire R9 290 Vapor-X 4Gb
Storage Hynix Plat P41 2Tb\Samsung MZVL21 1Tb / Samsung 980 Pro 1Tb
Display(s) 22" Dell Wide/24" Asus
Case Lian Li PC-101 ATX custom mod / Antec Lanboy Air Black & Blue
Audio Device(s) SB Audigy 7.1
Power Supply Corsair Enthusiast TX750
Mouse Logitech G502 Lightspeed Wireless / Logitech G502 Proteus Spectrum
Keyboard K68 RGB — CHERRY® MX Red
Software Win10 Pro \ RIP:Win 7 Ult 64 bit
You can't brute force 100+ character full ASCII passwords. No matter what kind of super computer you're using. Afaik, these crypters use just that. A block of ASCII characters as a password to unlock files.
Not accurate. Like we said, implausible and impractical, but not impossible.


What if you use a longer passcode? Here’s how long the FBI would need:
  • seven-digit passcodes will take up to 9.2 days, and on average 4.6 days, to crack
  • eight-digit passcodes will take up to three months, and on average 46 days, to crack
  • nine-digit passcodes will take up to 2.5 years, and on average 1.2 years, to crack
  • 10-digit passcodes will take up to 25 years, and on average 12.6 years, to crack
  • 11-digit passcodes will take up to 253 years, and on average 127 years, to crack
  • 12-digit passcodes will take up to 2,536 years, and on average 1,268 years, to crack
  • 13-digit passcodes will take up to 25,367 years, and on average 12,683 years, to crack
 
Top