Search This Blog

Tuesday, August 23, 2005

WindowSecurity.com - Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 2)

Title: Ideal-to-Realized Security Assurance In Cryptographic Keys (Part 2)
Author: Justin Troutman
Summary: In the final installment of this two-part series, we'll cover two closely related collision attacks - the birthday attack and the meet-in-the-middle attack. We'll conclude by emphasizing the importance of simplicity through conservatism, and establishing a "golden rule" for instantiating the lengths of many cryptographic values.
Link: http://www.WindowSecurity.com/articles/Ideal-to-Realized-Security-Assurance-Cryptographic-Keys-Part2.html

No comments: