• Thumbnail for EFF DES cracker
    In cryptography, the EFF DES cracker (nicknamed "Deep Crack") is a machine built by the Electronic Frontier Foundation (EFF) in 1998, to perform a brute...
    10 KB (1,031 words) - 05:27, 28 February 2023
  • Challenges. They coordinated and supported the construction of the EFF DES cracker (nicknamed Deep Crack), using special purpose hardware and software...
    46 KB (4,516 words) - 06:14, 13 May 2025
  • Thumbnail for Data Encryption Standard
    feasibility of cracking DES quickly was demonstrated in 1998 when a custom DES-cracker was built by the Electronic Frontier Foundation (EFF), a cyberspace civil...
    60 KB (6,717 words) - 17:36, 25 May 2025
  • Electronic Frontier Foundation (EFF) built a dedicated password cracker using ASICs. Their machine, Deep Crack, broke a DES 56-bit key in 56 hours, testing...
    27 KB (3,100 words) - 19:17, 20 May 2025
  • to use the term copyleft. He coined Deep Crack as the name of the EFF DES cracker. He ported the SimCity computer game to several versions of Unix and...
    6 KB (634 words) - 08:32, 24 April 2025
  • Thumbnail for Triple DES
    Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher...
    23 KB (2,957 words) - 06:06, 5 May 2025
  • Thumbnail for DES-X
    In cryptography, DES-X (or DESX) is a variant on the DES (Data Encryption Standard) symmetric-key block cipher intended to increase the complexity of...
    4 KB (533 words) - 09:53, 31 October 2024
  • Thumbnail for Supercomputer
    Energy Agency, Issy-les-Moulineaux, France. Retrieved 25 May 2011. "EFF DES Cracker Source Code". Cosic.esat.kuleuven.be. Retrieved 8 July 2011. "Disarmament...
    84 KB (8,134 words) - 04:46, 20 May 2025
  • to certificate-based authentication (such as PEAP-TLS or EAP-TLS). EFF DES cracker "Windows 98 Dial-Up Networking Security Upgrade Release Notes (August...
    5 KB (586 words) - 13:29, 2 February 2025
  • GDES (redirect from G-DES)
    In cryptography, the Generalized DES Scheme (GDES or G-DES) is a variant of the DES symmetric-key block cipher designed with the intention of speeding...
    2 KB (193 words) - 07:21, 27 April 2022
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    12 KB (1,106 words) - 03:22, 29 November 2024
  • EFF DES cracker after 2.5 days) RSA Lab's 56-bit DES-III Encryption Challenge — Completed 19 January 1999 (after 22.5 hours with the help of the EFF DES...
    17 KB (1,554 words) - 11:13, 8 February 2025
  • Thumbnail for Cryptography
    an encryption passphrase or password. The Electronic Frontier Foundation (EFF) argued that this is a violation of the protection from self-incrimination...
    99 KB (10,975 words) - 18:31, 26 May 2025
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    8 KB (716 words) - 10:14, 4 January 2025
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    12 KB (1,295 words) - 05:00, 19 May 2025
  • "DES Cracker Project". EFF. Archived from the original on May 7, 2017. Retrieved August 26, 2015. On Wednesday, July 17, 1998 the EFF DES Cracker, which...
    15 KB (801 words) - 01:34, 22 August 2024
  • article details the various tables referenced in the Data Encryption Standard (DES) block cipher. All bits and bytes are arranged in big endian order in this...
    11 KB (600 words) - 11:47, 6 November 2023
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    4 KB (398 words) - 12:58, 8 January 2025
  • block cipher DES has a few specific keys termed "weak keys" and "semi-weak keys". These are keys that cause the encryption mode of DES to act identically...
    9 KB (1,302 words) - 16:51, 26 March 2025
  • not merely theoretical; many algorithms that were once considered secure (DES, 512-bit RSA, RC4) are now known to be vulnerable, some even to amateur attackers...
    12 KB (1,222 words) - 11:18, 7 February 2025
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    9 KB (839 words) - 12:48, 9 June 2024
  • Thumbnail for XTEA
    whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    9 KB (969 words) - 14:09, 19 April 2025
  • Second Annual Meeting on DNA Based Computers. Princeton University. Cracking DES – Secrets of Encryption Research, Wiretap Politics & Chip Design. Electronic...
    21 KB (2,168 words) - 17:09, 27 May 2025
  • mounted by a cyber civil rights group with limited resources; see EFF DES cracker. Even before that demonstration, 56 bits was considered insufficient...
    29 KB (3,222 words) - 03:31, 9 April 2025
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    2 KB (278 words) - 23:01, 22 April 2023
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    7 KB (731 words) - 10:15, 4 January 2025
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    3 KB (412 words) - 17:18, 19 December 2024
  • whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    23 KB (3,051 words) - 20:21, 24 March 2025
  • Thumbnail for SM4 (cipher)
    whitening (Whitening transformation) Attack (cryptanalysis) Brute-force (EFF DES cracker) MITM Biclique attack 3-subset MITM attack Linear (Piling-up lemma)...
    9 KB (958 words) - 16:44, 2 February 2025
  • named a Feistel network after Horst Feistel is notably implemented in the DES cipher. Many other realizations of block ciphers, such as the AES, are classified...
    51 KB (6,569 words) - 08:42, 11 April 2025