Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It doesn't work like that. If you use this to create, say, a cryptographic key, you can break it if you can bruteforce an 80-bit key; depending on the specific application, you may need much less (e.g. if you can perform a birthday attack, you only need 2^40 tries).


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: