IBM CCA 3DES Exporter Key Generation Weakness

Details on how to execute this attack, as well as how to construct the custom hardware used in a brute force attack on a single DES key, have been published by Mike Bond and Richard Clayton. The full paper has been made available online at:


Privacy Statement
Copyright 2010, SecurityFocus