gents
some quick facts & openings re: this stuff:
for your algorithm, you would typically want to mimic
what elcomsoft do with their office password recovery products, namely:
start with a dictionary attack.
proceed to a dictionary attack with smart mutation enabled (trying all uc & lc combos, other digit substitutions etc.
browserUK has a point re: time in an abstract sense:
the following excerpted from the elcomsoft site
even if the password contains just small and capital letters, and the length is 12, the total is 52^12 = 390,877,006,486,250,192,896. Even if ***** will be able to test a million passwords per second (actual speed is lower), it would take more than twelve million years to find the correct one. Well, if you're lucky enough -- just six million years ;)
HOWEVER certain block & stream ciphers (ie RC4 stream c. used in office) have
smaller key lengths which enable effective brute force attacks against them. the maximum time against RC4, for instance, given by the (reliable) source above is 13 days.
regards,
wufnik
in the world of the mules there are no rules