[Full-disclosure] Comparing Algorithms On The List Of Hard-to-brut-force?
gautam.bipin at gmail.com
Tue Nov 1 17:41:10 GMT 2005
Which Algorithm in the list is hard hard (more resource/computation
consuming) to brute-force... (in order?) considering all other factor
* Feel free to discuss algorithms NOT LISTED here and also the ones
used by FILE-COMPRESSION utilities ???
Even if you know a geleral statistic abt. a few of these or any
experience/info please share. I'm trying to draw a nice statistic BUT
couldn't find it elsewhere.
Zeroth law of security: The possibility of poking a system from lower
privilege is zero unless & until there is possibility of direct,
indirect or consequential communication between the two...
Full-Disclosure is hosted and sponsored by Secunia.