Penetration Testing mailing list archives
Cryptographic Functions
From: "M.D.Mufambisi" <mufambisi () gmail com>
Date: Tue, 18 Aug 2009 17:50:31 +0200
Hello people. 1. When a passphrase is used a key in symetric cryptography, how does the pass phrase map to the key in an algorithm like AES? ie....how many letters correspond to 1 bit? etc? Regards Munyaradzi Mufambisi ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- Cryptographic Functions M.D.Mufambisi (Aug 18)
- Re: Cryptographic Functions M.B.Jr. (Aug 18)
- Re: Cryptographic Functions Jeffrey Walton (Aug 18)
- Message not available
- Re: Cryptographic Functions M.D.Mufambisi (Aug 19)
- Re: Cryptographic Functions Jeffrey Walton (Aug 19)
- Re: Cryptographic Functions M.D.Mufambisi (Aug 19)
- Re: Cryptographic Functions Steve Friedl (Aug 19)
- Message not available
- Re: Cryptographic Functions David Howe (Aug 19)
- Re: Cryptographic Functions Jan Schejbal (Aug 21)