X-Nico

2 unusual facts about Brute Force


Brute Force: Cracking the Data Encryption Standard

Brute Force (2005, Copernicus Books) is a book by Matt Curtin about cryptography.

In this book, the author accounts his involvement in the DESCHALL Project, mobilizing thousands of personal computers in 1997 in order to meet the challenge to crack a single message encrypted with DES.


Ceratosaurus

Ceratosaurus has appeared in several films, including the first live action film to feature dinosaurs, D. W. Griffith's Brute Force (1914).

History of hypertext

For example, in the early 20th century, two visionaries attacked the cross-referencing problem through proposals based on labor-intensive, brute force methods.


see also

EFF DES cracker

In July 2012, security researchers David Hulton and Moxie Marlinspike unveiled a cloud computing tool for breaking the MSCHAPv2 protocol by recovering the protocol's DES encryption keys by brute force.

Generalized Riemann hypothesis

The yet to be verified proof of Harald Helfgott of this conjecture verifies the GRH for several thousand small characters up to a certain imaginary part to obtain sufficient bounds that prove the conjecture for all integers above 1029, integers below which have already been verified by brute force.

Microsoft Excel

The situation changed fundamentally in Excel 2007, where the modern AES algorithm with a key of 128 bits started being used for decryption, and a 50,000-fold use of the hash function SHA1 reduced the speed of brute-force attacks down to hundreds of passwords per second.

Post correspondence problem

A brute force search solves the problem in time O(2k), but this may be difficult to improve upon, since the problem is NP-complete.

Sergey Yablonsky

Yablonsky and his students were ones of the first in the world to raise the issues of potentially inherent unavoidability of the brute force search for some problems, the precursor of the P = NP problem, though Gödel's letter to von Neumann, dated 20 March 1956 and discovered in 1988, may have preceded them.

Tim Newsham

The Newsham 21-bit attack is a method used primarily by KisMAC to brute force WEP keys.

VLC media player

However, it does not do the same on RPC-2 firmware drives, as in these cases the region coding is enforced by the drive itself, however, it can still brute-force the CSS encryption to play a foreign-region DVD on an RPC-2 drive.