Full Disclosure mailing list archives

Comparing Algorithms On The List Of Hard-to-brut-force?


From: Bipin Gautam <gautam.bipin () gmail com>
Date: Tue, 1 Nov 2005 23:26:10 +0545

hello list,

Which Algorithm in the list is hard hard (more resource/computation
consuming) to brute-force... (in order?) considering all other factor
'ALMOST' similar?

views?
----------
Blowfish
AES
Twofish
AES-BLOWFISH
Serpant
CAST5
AES-Twofish
Serpant-AES
AES-BLOWFISH-SERPANT
Twofish-SERPANT
Triple DES
AES-Twofish-Serpant
Serpant-Twofish-AES


 * Feel free to discuss algorithms NOT LISTED here and also the ones
used by FILE-COMPRESSION utilities ???

Even if you know a geleral statistic abt. a few of these or any
experience/info please share. I'm trying to draw a nice statistic BUT
couldn't find it elsewhere.

--
Bipin Gautam
http://bipin.tk

Zeroth law of security: The possibility of poking a system from lower
privilege is zero unless & until there is possibility of direct,
indirect or consequential communication between the two...
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: