This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Designers of DES were ahead of their time Unit 3 - 44 Cryptanalysis of DES Brute Force requires about 2 56 operations -impractical in 1977 Wiener describes custom VLSI parallel search engine...
View Full Document
This note was uploaded on 03/17/2011 for the course ECE 4472 taught by Professor Ouda during the Fall '10 term at UWO.
- Fall '10
- Information Security