Talk:Brute-force attack/to do
Appearance
- Discussion of TWINKLE and TWIRL
- Add an overview of suggested hardware designs for key search.
- Discuss hash collision search; MD5CRK
- Discuss Time-memory tradeoffs
- Briefly survey the cracking challenges (RC5, DES etc)
- Types of attacks
- Attacks on wireless networks
- Tools used for brute force attacks