• Redjard@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    What is the threat szenario?
    If you are smart about parallelization and have access to custom hardware, couldn’t you turn 5 days into 1 hour or less?

    • Markaos@lemmy.one
      link
      fedilink
      arrow-up
      2
      ·
      6 months ago

      Yes, that’s exactly the problem - there’s nothing wrong with the encryption used, but it’s IMHO incorrect to call it time-based when it’s “work-based” and it just so happens that the specific computer doing the encryption works at a given speed.

      I don’t call my laptop’s FDE time-based encryption just because I picked an encryption that takes it 10 seconds to decrypt the key.