Jump to content

Talk:Brute-force attack/to do

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
  • Discussion of TWINKLE and TWIRL
  • Add an overview of suggested hardware designs for key search.
  • Discuss hash collision search; MD5CRK
  • Discuss Time-memory tradeoffs
  • Briefly survey the cracking challenges (RC5, DES etc)
  • Types of attacks
  • Attacks on wireless networks
  • Tools used for brute force attacks

Start a discussion