Brute force attacks

24Citations
Citations of this article
90Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The one attack that can always be mounted against any block cipher is a search for the key. No amount of clever design can prevent this attack and the designers’ aim is to ensure that this is the best attack available to the adversary.

Cite

CITATION STYLE

APA

Knudsen, L. R., & Robshaw, M. J. B. (2011). Brute force attacks. In Information Security and Cryptography (Vol. 18, pp. 95–108). Springer International Publishing. https://doi.org/10.1007/978-3-642-17342-4_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free