[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Comparing Algorithms On The List Of Hard-to-brut-force?
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] Comparing Algorithms On The List Of Hard-to-brut-force?
- From: Bipin Gautam <gautam.bipin@xxxxxxxxx>
- Date: Tue, 1 Nov 2005 23:26:10 +0545
hello list,
Which Algorithm in the list is hard hard (more resource/computation
consuming) to brute-force... (in order?) considering all other factor
'ALMOST' similar?
views?
----------
Blowfish
AES
Twofish
AES-BLOWFISH
Serpant
CAST5
AES-Twofish
Serpant-AES
AES-BLOWFISH-SERPANT
Twofish-SERPANT
Triple DES
AES-Twofish-Serpant
Serpant-Twofish-AES
* Feel free to discuss algorithms NOT LISTED here and also the ones
used by FILE-COMPRESSION utilities ???
Even if you know a geleral statistic abt. a few of these or any
experience/info please share. I'm trying to draw a nice statistic BUT
couldn't find it elsewhere.
--
Bipin Gautam
http://bipin.tk
Zeroth law of security: The possibility of poking a system from lower
privilege is zero unless & until there is possibility of direct,
indirect or consequential communication between the two...
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/