IBM CCA 3DES Exporter Key Generation Weakness

Details on how to execute this attack, as well as how to construct the custom hardware used in a brute force attack on a single DES key, have been published by Mike Bond and Richard Clayton. The full paper has been made available online at:

http://www.cl.cam.ac.uk/~rnc1/descrack/


 

Privacy Statement
Copyright 2010, SecurityFocus