recover forgotten password for sparse image

I created a encrypted sparse image a couple of years ago. I have since forgotten the password. How do I recover the password?


(OS X 10.10.5)

Thanks.

Posted on Jul 25, 2015 1:15 PM

Reply
Question marked as Top-ranking reply

Posted on Jul 26, 2015 10:52 AM

UserFromCupertino wrote:


The internets tell me if you get the password hash out of some file, you should be able to run a password hacker on it. Where would I find this password hash?


Thanks


There's no "hash out of some file" here. That's fodder for TV shows and fiction and poorly-written crypto, but — short of a completely revolutionary cryptographic attack — that's just not something found with peer-reviewed and secure modern cryptography.


If the password has been forgotten, then somebody will have to brute-force the encrypted disk, and — with a good password having been chosen — that might take a few decades. Not kidding about that time horizon, either. Might take quite a lot longer than decades, too.


With AES — which is what is used with most OS X disk images — there are no known viable attacks. There is only brute-forcing. And that effort might require — and I'm not making this up — billions of years for a good password, with present-day technology.


If things were otherwise, the encryption would not be considered very secure.

7 replies
Question marked as Top-ranking reply

Jul 26, 2015 10:52 AM in response to UserFromCupertino

UserFromCupertino wrote:


The internets tell me if you get the password hash out of some file, you should be able to run a password hacker on it. Where would I find this password hash?


Thanks


There's no "hash out of some file" here. That's fodder for TV shows and fiction and poorly-written crypto, but — short of a completely revolutionary cryptographic attack — that's just not something found with peer-reviewed and secure modern cryptography.


If the password has been forgotten, then somebody will have to brute-force the encrypted disk, and — with a good password having been chosen — that might take a few decades. Not kidding about that time horizon, either. Might take quite a lot longer than decades, too.


With AES — which is what is used with most OS X disk images — there are no known viable attacks. There is only brute-forcing. And that effort might require — and I'm not making this up — billions of years for a good password, with present-day technology.


If things were otherwise, the encryption would not be considered very secure.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

recover forgotten password for sparse image

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.