8 Sep
2000
8 Sep
'00
11:44 a.m.
At 08:02 PM 9/7/00 -0400, Kevin Elliott wrote:
Does this method work for apps that are generating and testing lots of keys or does the initial key generation step still have to be undertaken? The whole point of the blowfish technique was to increase the attackers required effort. It was basicly assumed that valid users would simply store the expanded key. Is their a link somewhere to more information on this technique or could you expand on it? --
Kevin if you haven't, read the DES Crack book, its online too.