Title: Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 2)
Author: Justin Troutman
Summary: In the final installment of this two-part series, we'll cover two closely related collision attacks - the birthday attack and the meet-in-the-middle attack. We'll conclude by emphasizing the importance of simplicity through conservatism, and establishing a "golden rule" for instantiating the lengths of many cryptographic values.
Link: http://www.WindowSecurity.com/articles/Ideal-to-Realized-Security-Assurance-Cryptographic-Keys-Part2.html
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, August 23, 2005
WindowSecurity.com - Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 2)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment