[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <8e5ffb560511010941o6680b496ofac7e893656e80ae@mail.gmail.com>
Date: Tue Nov 1 17:43:15 2005
From: gautam.bipin at gmail.com (Bipin Gautam)
Subject: Comparing Algorithms On The List Of
Hard-to-brut-force?
hello list,
Which Algorithm in the list is hard hard (more resource/computation
consuming) to brute-force... (in order?) considering all other factor
'ALMOST' similar?
views?
----------
Blowfish
AES
Twofish
AES-BLOWFISH
Serpant
CAST5
AES-Twofish
Serpant-AES
AES-BLOWFISH-SERPANT
Twofish-SERPANT
Triple DES
AES-Twofish-Serpant
Serpant-Twofish-AES
* Feel free to discuss algorithms NOT LISTED here and also the ones
used by FILE-COMPRESSION utilities ???
Even if you know a geleral statistic abt. a few of these or any
experience/info please share. I'm trying to draw a nice statistic BUT
couldn't find it elsewhere.
--
Bipin Gautam
http://bipin.tk
Zeroth law of security: The possibility of poking a system from lower
privilege is zero unless & until there is possibility of direct,
indirect or consequential communication between the two...
Powered by blists - more mailing lists