Diferente pentru blog/meet-in-the-middle intre reviziile #120 si #121

Nu exista diferente intre titluri.

Diferente intre continut:

For the pattern p it tries all the possible keys to obtain a set of numbers corresponding Ek(p). Also for the pattern s it uses all the possible keys to decrypt s, Dk(s).
If we find any match in the two sets it means that Eki(p) = Dkj(s) so the secret keys are ki and kj.
The naive brute force algorithm does $2^56^ * 2^56^$ iterations going through all possible values of k1 and k2 while this algorithm uses $2^56^ * 56$ memory to store all Eki(p) and does $2^56^$ work to find a match.
This is quite a bit of space and quite a bit of computation time. But a for a large enough company or country it starts being within the realm of posibility.
Breaking 2DES was basically the DOUBLE problem from the International Olympiad in Informatics 2001.
The problem DOUBLE the International Olympiad in Informatics 2001 was basically asking to break 2DES for keys of size 24 which is quite feasible.
h2. Discrete logarithm

Nu exista diferente intre securitate.

Topicul de forum nu a fost schimbat.