|
IBM CCA 3DES Exporter Key Generation Weakness
Details on how to execute this attack, as well as how to construct the custom hardware used in a brute force attack on a single DES key, have been published by Mike Bond and Richard Clayton. The full paper has been made available online at: http://www.cl.cam.ac.uk/~rnc1/descrack/ |
|
Privacy Statement |