[EAS] Next Generation
Mike McCarthy
towers at mre.com
Sat Nov 15 21:18:16 CST 2014
4 alpha-numeric characters. Assuming a pool of 60 characters to select
with UC/LC (26+26+8) and no repeats, that would create a pool of something
close to 11,700,000 combinations.
Again, the mission is to prevent accidental re-transmission first with
some measure of anti-hacking second.
I don't doubt that given enough time, someone would find the code...each
week. Cracking the code will be something of a waste as it will be public
knowledge anyway if the code is published. But if it is not, 1/11,700,000
is a pretty good start.
MM
On Sat, November 15, 2014 1:36 am, RobertM wrote:
> While I am on record that eliminating most of this nonsense is the best
> solution, if an authenticator was used with 4 bits I only need 16
> attempts to break the systems, easily done in a few minutes at worst.
More information about the EAS
mailing list