Pagini recente » Diferente pentru blog/meet-in-the-middle intre reviziile 123 si 73 | Diferente pentru blog/meet-in-the-middle intre reviziile 123 si 41 | Diferente pentru blog/meet-in-the-middle intre reviziile 12 si 13 | Diferente pentru blog/meet-in-the-middle intre reviziile 74 si 73 | Diferente pentru blog/meet-in-the-middle intre reviziile 121 si 120
Nu exista diferente intre titluri.
Diferente intre continut:
For the pattern p it tries all the possible keys to obtain a set of numbers corresponding Ek(p). Also for the pattern s it uses all the possible keys to decrypt s, Dk(s).
If we find any match in the two sets it means that Eki(p) = Dkj(s) so the secret keys are ki and kj.
The naive brute force algorithm does $2^56^ * 2^56^$ iterations going through all possible values of k1 and k2 while this algorithm uses $2^56^ * 56$ memory to store all Eki(p) and does $2^56^$ work to find a match.
This is quite a bit of space and quite a bit of computation time. But a for a large enough company or country it starts being within the realm of posibility.
The problem DOUBLE the International Olympiad in Informatics 2001 was basically asking to break 2DES for keys of size 24 which is quite feasible.
Breaking 2DES was basically the DOUBLE problem from the International Olympiad in Informatics 2001.
h2. Discrete logarithm
Nu exista diferente intre securitate.
Topicul de forum nu a fost schimbat.