Brute force attack/External Links: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris No edit summary |
imported>Sandy Harris No edit summary |
||
Line 2: | Line 2: | ||
The classic paper <ref>{{cite paper|author=Blaze, Diffie, Rivest, Schneier, Shimomura, Thompson & Wiener |title=Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security|date=1996|url=http://www.schneier.com/paper-keylength.html}}</ref> on key sizes required to resist brute force attacks. | The classic paper <ref>{{cite paper|author=Blaze, Diffie, Rivest, Schneier, Shimomura, Thompson & Wiener |title=Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security|date=1996|url=http://www.schneier.com/paper-keylength.html}}</ref> on key sizes required to resist brute force attacks. | ||
[[EFF]]'s DES Cracker <ref>{{cite book|title=Cracking DES - Secrets of Encryption Research, Wiretap Politics & Chip Design|author=Electronic Frontier Foundation|id=ISBN 1-56592-520-3|publisher=O'reilly & Associates Inc|year=1998|url=http://cryptome.org/cracking-des/cracking-des.htm}}</ref> | [[EFF]]'s DES Cracker <ref>{{cite book|title=Cracking DES - Secrets of Encryption Research, Wiretap Politics & Chip Design|author=Electronic Frontier Foundation|id=ISBN 1-56592-520-3|publisher=O'reilly & Associates Inc|year=1998|url=http://cryptome.org/cracking-des/cracking-des.htm}}</ref>, a machine designed and built for a fast brute force attack on the [[Data Encryption Standard]]. | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} |
Revision as of 18:59, 26 March 2009
- Please sort and annotate in a user-friendly manner and consider archiving the URLs behind the links you provide. See also related web sources.
The classic paper [1] on key sizes required to resist brute force attacks.
EFF's DES Cracker [2], a machine designed and built for a fast brute force attack on the Data Encryption Standard.
References
- ↑ Blaze, Diffie, Rivest, Schneier, Shimomura, Thompson & Wiener (1996). Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security.
- ↑ Electronic Frontier Foundation (1998). Cracking DES - Secrets of Encryption Research, Wiretap Politics & Chip Design. O'reilly & Associates Inc. ISBN 1-56592-520-3.