:34:10
Stanley, you want to get wet?
:34:12
- I don't have a suit.
- You don't need one.
:34:15
- Come on, Stan.
- Later.
:34:19
- Some view. Let's get a drink.
- Pool lights on.
:34:38
- So how did you do it?
- Do what?
:34:40
Break the code.
:34:42
I dropped a logic bomb
through the trap door.
:34:45
No, you didn't.
You didn't have time.
:34:48
- What'll you have?
- Scotch.
:34:50
- You can do better than that.
- I used a password sniffer.
:34:56
How did you do it?
:34:58
I don't know exactly. I see the code
in my head. I can't explain it.
:35:04
Let me show you something.
:35:19
Pretty impressive, huh?
:35:26
So, what we need from you is a worm.
A hydra, actually.
:35:30
A multiheaded worm to sniff out digital
footprints across an encrypted network.
:35:36
- What kind of cipher?
- A Vernam encryption.
:35:40
The key code is destroyed
upon implementation.
:35:43
And it's a true 128-bit encryption.
:35:46
Well, actually,
we're talking a 512-bit.
:35:51
- That's definitely not possible.
- What if I give you 10 million dollars?
:35:57
That would cover all your problems.
Yes?