This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Designers of DES were ahead of their time Unit 3 - 44 Cryptanalysis of DES Brute Force requires about 2 56 operations -impractical in 1977 Wiener describes custom VLSI parallel search engine...
View Full Document
- Fall '10
- Information Security, Block cipher, Data Encryption Standard, exhaustive key search, VLSI parallel search