Ideal-to-realized security assurance in cryptographic keys (part 2)
In the final installment of this two-part series, we'll cover two closely related collision attacks - the birthday attack and the meet-in-the-middle attack. We'll conclude by emphasizing the importance of simplicity through conservatism, and establishing a "golden rule" for instantiating the lengths of many cryptographic values.
By Justin Troutman at WindowSecurity.com
[ Read more ]