Where does the effort to bruteforce SSL stand? I've got a bunch of P5/90s ready and waiting. Peter Trei Senior Software Engineer Purveyor Development Team Process Software Corporation trei@process.com
Where does the effort to bruteforce SSL stand?
Andy has the spec wrapped up, and is finalising his Windows 32 Client. I have the key doler running, a perl client and a shell driving script, along with a new WWW interface (which we hope won't be used much) Adam has bruterc4 tweaked to interact with my perl client. Andrew has a copy of bruterc4 and is making brutessl similar. We're all ready to go, but I'm off for three weeks, and as Adam will be taking over my stuff in my absence, it might take him a while to understand it and make the few last minute tweaks ....
On Wed, 26 Jul 1995, Peter Trei wrote:
Where does the effort to bruteforce SSL stand?
[an addition to Piete's follow-up] We should be ready to get going very soon. Clients and servers are working together and just need a little more testing to make sure they are better than perfect :-) The protocol we're going to use is designed to be highly general and can be used to attempt a brute force attack on any crypto algorithm. More on this later, but we've had a few thoughts... - Andy +-------------------------------------------------------------------------+ | Andrew Brown Internet <asb@nexor.co.uk> Telephone +44 115 952 0585 | | PGP (2048/9611055D): 69 AA EF 72 80 7A 63 3A C0 1F 9F 66 64 02 4C 88 | +-------------------------------------------------------------------------+
participants (3)
-
Andy Brown -
Peter Trei -
Piete Brooks