on step reduced md5 to 16 steps (of 64 steps using all of the same
input) this attack takes less than 20 minutes on a pc.
this makes the system 4 times smaller while keeping *the structure* of
the system.
examples at:
http://seclists.org/fulldisclosure/2009/Jun/0216.html
if someone give me an acc
Ian G wrote:
> On 19/6/09 15:36, Jean-Marc Desperrier wrote:
>> Nelson B Bolyard wrote:
>>> if you send an encrypted message to
>>> someone from whom you have never received a signed S/MIME message, you
>>> will
>>> use weak encryption.
>
> Does this assume LDAP for acquiring the certificate witho
On 19/6/09 15:36, Jean-Marc Desperrier wrote:
Nelson B Bolyard wrote:
if you send an encrypted message to
someone from whom you have never received a signed S/MIME message, you
will
use weak encryption.
Does this assume LDAP for acquiring the certificate without a signed
S/MIME message? (So
3 matches
Mail list logo