Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Brute-force attack
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==References== {{Refbegin}} * {{cite conference|last1=Adleman|first1=Leonard M.|author-link=Leonard M. Adleman |last2=Rothemund|first2=Paul W.K.|author-link2=Paul W. K. Rothemund|last3=Roweis|first3=Sam|author-link3=Sam Roweis|last4=Winfree|first4=Erik|author-link4=Erik Winfree|title=On Applying Molecular Computation To The Data Encryption Standard|journal=Proceedings of the Second Annual Meeting on DNA Based Computers|publisher=[[Princeton University]]|date=June 10β12, 1996}} * {{cite book|title=Cracking DES β Secrets of Encryption Research, Wiretap Politics & Chip Design|year=1998|publisher=[[Electronic Frontier Foundation]]|isbn=1-56592-520-3|url-access=registration|url=https://archive.org/details/crackingdes00elec}} *{{cite book|last1=Burnett|first1=Mark|first2=James C.|last2=Foster|url=https://books.google.com/books?id=-WShG0uezvEC|title=Hacking the Code: ASP.NET Web Application Security|publisher=Syngress|year=2004|isbn=1-932266-65-8}} * {{cite journal|last1=Diffie|first1=W.|last2=Hellman|first2=M.E.|title=Exhaustive Cryptanalysis of the NBS Data Encryption Standard|journal=Computer|volume=10|year=1977|doi=10.1109/c-m.1977.217750|pages=74β84|s2cid=2412454}} *{{cite web|last=Graham|first=Robert David|title=Password cracking, mining, and GPUs|date=22 June 2011|access-date=17 August 2011|publisher=erratasec.com|url=http://erratasec.blogspot.com/2011/06/password-cracking-mining-and-gpus.html}} *{{cite web|last=Ellis|first=Claire|title=Exploring the Enigma|date=March 2005|url=http://plus.maths.org/content/exploring-enigma|publisher=Plus Magazine}} *{{cite web|last=Kamerling|first=Erik|url=https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=84d57a16-74eb-4907-85a9-582e169affbc&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments|title=Elcomsoft Debuts Graphics Processing Unit (GPU) Password Recovery Advancement|date=2007-11-12|publisher=[[NortonLifeLock|Symantec]]}} *{{cite news|last=Kingsley-Hughes|first=Adrian|url=http://www.zdnet.com/blog/hardware/elcomsoft-uses-nvidia-gpus-to-speed-up-wpawpa2-brute-force-attack/2724|archive-url=https://web.archive.org/web/20100626235736/http://www.zdnet.com/blog/hardware/elcomsoft-uses-nvidia-gpus-to-speed-up-wpawpa2-brute-force-attack/2724|url-status=dead|archive-date=June 26, 2010|title=ElcomSoft uses NVIDIA GPUs to Speed up WPA/WPA2 Brute-force Attack|work=[[ZDNet]]|date=2008-10-12}} * {{cite journal|last=Landauer|first=L|url=http://domino.research.ibm.com/tchjr/journalindex.nsf/c469af92ea9eceac85256bd50048567c/8a9d4b4e96887b8385256bfa0067fba2?OpenDocument|title=Irreversibility and Heat Generation in the Computing Process|journal=IBM Journal of Research and Development|volume=5|year=1961|issue=3|pages=183β191|doi= 10.1147/rd.53.0183|archive-url=https://web.archive.org/web/20160303181021/http://domino.research.ibm.com/tchjr/journalindex.nsf/c469af92ea9eceac85256bd50048567c/8a9d4b4e96887b8385256bfa0067fba2?OpenDocument|archive-date=March 3, 2016 }} * {{cite book|last1=Paar|first1=Christof|first2=Jan|last2=Pelzl|first3=Bart|last3=Preneel|url=http://www.crypto-textbook.com|title=Understanding Cryptography: A Textbook for Students and Practitioners|publisher=Springer|year=2010|isbn=978-3-642-04100-6}} *{{cite book|last=Reynard|first=Robert|url=https://books.google.com/books?id=3nTmBW0ONEEC&pg=PA86|title=Secret Code Breaker II: A Cryptanalyst's Handbook|isbn=1-889668-06-0|year=1997|access-date=2008-09-21|publisher=Smith & Daniel Marketing|location=Jacksonville, FL}} *{{cite book|last=Ristic|first=Ivan|url=https://books.google.com/books?id=HnQl5OVtOYgC|title=Modsecurity Handbook|publisher=Feisty Duck|year=2010 |isbn=978-1-907117-02-2}} *{{cite book|last1=Viega|first1=John|author-link=John Viega|url=https://books.google.com/books?id=FBYHEBTrZUwC|first2=Matt|last2=Messier|first3=Pravir|last3=Chandra|access-date=2008-11-25|year=2002|isbn=0-596-00270-X|title=Network Security with OpenSSL|publisher=O'Reilly}} * {{cite journal|last=Wiener|first=Michael J.|title=Efficient DES Key Search |journal= Practical Cryptography for Data Internetworks|publisher=W. Stallings, editor, IEEE Computer Society Press|year=1996}} *{{cite web|url=http://www.us-cert.gov/cas/techalerts/TA08-137A.html|title=Technical Cyber Security Alert TA08-137A: Debian/Ubuntu OpenSSL Random Number Generator Vulnerability|date=2008-05-16|access-date=2008-08-10|publisher=[[United States Computer Emergency Readiness Team]] (CERT)|ref={{harvid|CERT-2008}}|archive-url=https://web.archive.org/web/20080916083758/http://www.us-cert.gov/cas/techalerts/TA08-137A.html|archive-date=September 16, 2008}} * {{cite web|title=NSA's How Mathematicians Helped Win WWII|url=http://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/how_math_helped_win.shtml|date=15 Jan 2009|publisher=[[National Security Agency]]|ref={{harvid|NSA-2009}}|archive-url=https://web.archive.org/web/20090307080155/http://www.nsa.gov/about/cryptologic_heritage/center_crypt_history/publications/how_math_helped_win.shtml|archive-date=March 7, 2009}} {{Refend}}
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Brute-force attack
(section)
Add topic