Can someone explain @filippo's post to me like I'm a 5-year-old?
-
Can someone explain @filippo's post to me like I'm a 5-year-old?
-
Can someone explain @filippo's post to me like I'm a 5-year-old?
-
Can someone explain @filippo's post to me like I'm a 5-year-old?
@dangoodin @filippo the techniques to crack symmetric crypto are a logarithm reducing 128 bit to 64bits worth of attempts... 256 bit reduces to 128 bit.
For asymmetric, the reduction is far greater.
Slightly better details here:
https://m.youtube.com/watch?v=_MoRcYLN-7U&t=6s&pp=2AEGkAIB -
Can someone explain @filippo's post to me like I'm a 5-year-old?
@dangoodin I have half an hour if you want to text me on Signal about it

-
@dangoodin @filippo the techniques to crack symmetric crypto are a logarithm reducing 128 bit to 64bits worth of attempts... 256 bit reduces to 128 bit.
For asymmetric, the reduction is far greater.
Slightly better details here:
https://m.youtube.com/watch?v=_MoRcYLN-7U&t=6s&pp=2AEGkAIB@scottley @dangoodin that is precisely the misconception the article is trying to rectify.
-
R relay@relay.infosec.exchange shared this topic