2DES and Meet in the Middle Attack

preview_player
Показать описание

Рекомендации по теме
Комментарии
Автор

شرحك فناااااان، لا تحرمنا من هالعلم الله يبارك فيك ويزيدك، شككككرا بروف

abo-alhosam
Автор

Clear explaination of Meet in the Middle ! Thanks

terryloo
Автор

You explained it really really well, but I am left with a doubt: in DES the computational cost of a successful brute force attack would be 2^56 (because there's 2^56 combinations to try), but in 2DES it's 2^56 + 2^56, am I right? You said it's basically the same as DES, but you have to first try the 2^56 combinations with the plain text and record the intermediate outputs and then do the same thing again with the cipher text and record the intermediate output, right?

iosifpuha
Автор

wonderful explanation, thank you very much

dinhomhm
Автор

Can you please explain how MITM is used to attack hash functions?

churchmankassym