Full Disclosure mailing list archives
Comparing Algorithms On The List Of Hard-to-brut-force?
From: Bipin Gautam <gautam.bipin () gmail com>
Date: Tue, 1 Nov 2005 23:26:10 +0545
hello list, Which Algorithm in the list is hard hard (more resource/computation consuming) to brute-force... (in order?) considering all other factor 'ALMOST' similar? views? ---------- Blowfish AES Twofish AES-BLOWFISH Serpant CAST5 AES-Twofish Serpant-AES AES-BLOWFISH-SERPANT Twofish-SERPANT Triple DES AES-Twofish-Serpant Serpant-Twofish-AES * Feel free to discuss algorithms NOT LISTED here and also the ones used by FILE-COMPRESSION utilities ??? Even if you know a geleral statistic abt. a few of these or any experience/info please share. I'm trying to draw a nice statistic BUT couldn't find it elsewhere. -- Bipin Gautam http://bipin.tk Zeroth law of security: The possibility of poking a system from lower privilege is zero unless & until there is possibility of direct, indirect or consequential communication between the two...
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Comparing Algorithms On The List Of Hard-to-brut-force? Bipin Gautam (Nov 01)
- RE: Comparing Algorithms On The List OfHard-to-brut-force? Brandon Enright (Nov 01)
- Re: Comparing Algorithms On The List OfHard-to-brut-force? Andrew Farmer (Nov 01)
- Re: Comparing Algorithms On The List OfHard-to-brut-force? James Longstreet (Nov 01)
- Re: Comparing Algorithms On The List OfHard-to-brut-force? Bipin Gautam (Nov 01)
- RE: Comparing Algorithms On The List OfHard-to-brut-force? Aditya Deshmukh (Nov 01)
- RE: Comparing Algorithms On The List OfHard-to-brut-force? Brandon Enright (Nov 01)