what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

toc.html

toc.html
Posted Dec 21, 1999

toc.html

tags | encryption
SHA-256 | 19f8f7f39dd3206f2dd12cabd9c89eaec742be4fc9a061ab528e2ff65992f96d

toc.html

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<HEAD>
<TITLE>Cracking DES: Secrets of Encryption Research, Wiretap Politics, and
Chip Design </TITLE>
</HEAD>
<BODY BGCOLOR="#ffffff">
<P>
<I>v </I>
<H2>
<I>Table of Contents </I>
</H2>
<BLOCKQUOTE>
<B><I><A HREF="intro.html">Intro</A> ........................................iii
</I></B>
<P>
<B><I><A HREF="foreword.html">Foreword</A> ........................................ix
</I></B>
<P>
<B><I><A HREF="preface.html">Preface</A> .......................................xiii
</I></B>
<P>
<B><I>1:<A HREF="chap-1.html">Overview</A>.....................................1-1
</I></B>
<BLOCKQUOTE>
Politics of Decryption ......................1-1 <BR>
Goals .......................................1-7 <BR>
History of DES Cracking .....................1-8 <BR>
EFF's DES Cracker Project ...................1-8 <BR>
Architecture ................................1-9 <BR>
Who Else Is Cracking DES? ..................1-16 <BR>
What To Do If You Depend On DES ............1-17 <BR>
Conclusion .................................1-18
</BLOCKQUOTE>
<P>
<B><I>2:<A HREF="chap-2.html">Design for DES Key Search Array</A> .............2-1
</I></B>
<BLOCKQUOTE>
On-Chip Registers ..........................2-1 <BR>
Commands ....................................2-4 <BR>
Search Unit Operation .....................2-4 <BR>
Sample Programming Descriptions .............2-5 <BR>
Scalability and Performance .................2-9 <BR>
Host Computer Software ......................2-9 <BR>
Glossary ...................................2-10
</BLOCKQUOTE>
</BLOCKQUOTE>
<I>vi</I>
<BLOCKQUOTE>
<B><I>3:<A HREF="chap-3.html">Design for DES Key Search Array Chip-Level Specification
</A>..3-1 </I></B>
<BLOCKQUOTE>
ASIC Description .........................................3-1 <BR>
Board description ........................................3-3 <BR>
Read and Write Timing ....................................3-5 <BR>
Addressing Registers .....................................3-7 <BR>
All-active Signal ........................................3-7 <BR>
ASIC Register Allocation .................................3-8
</BLOCKQUOTE>
<P>
<B><I>4:<A HREF="chap-4.html">Scanning the Source Code</A> ..................................41 </I></B>
<BLOCKQUOTE>
The Politics of Cryptographic Source Code .................4-1 <BR>
The Paper Publishing Exception ............................4-2 <BR>
Scanning ..................................................4-4 <BR>
Bootstrapping .............................................4-5
</BLOCKQUOTE>
<P>
<P>
<B><I>5: <A HREF="ch5/">Software Source Code</A>
......................................5-1
</I></B>
<P>
<B><I>6: <A HREF="ch6/">Chip Source Code</A>
..........................................6-1
</I></B>
<P>
<B><I>7: <A HREF="ch7/">Chip Simulator Source Code</A>
................................7-1
</I></B>
<P>
<B><I>8: <A HREF="chap-8.html">Hardware Board Schematics</A>
.............................................8-1 </I></B>
<BLOCKQUOTE>
Board Schematics ......................................................8-1
<BR>
Sun-4/470 backplane modifications ................................8-10 <BR>
PC Interfaces .......................................................8-12
<BR>
Errata ...............................................8-13
</BLOCKQUOTE>
<P>
<B><I>9: <A HREF="chap-9.html">Breaking One Million DES Keys by Yvo Desmedt</A> .........9-1 </I></B>
<BLOCKQUOTE>
Abstract .............................................9-1 <BR>
Introduction .........................................9-1 <BR>
The basic idea .......................................9-2 <BR>
Details of such a machine ............................9-2 <BR>
Obtained results and remarks .........................9-4 <BR>
Conclusion ...........................................9-4 <BR>
Acknowledgement ......................................9-5
</BLOCKQUOTE>
<P>
</BLOCKQUOTE>
<I>vii</I>
<BLOCKQUOTE>
<B><I>10:<A HREF="chap-10.html">
Architectural Considerations for Cryptanalytic Hardware</A> .. 10-1
</I></B>
<BLOCKQUOTE>
Abstract ............................10-1 <BR>
Introduction ........................10-1 <BR>
Motivation ..........................10-2 <BR>
Related work ........................10-4 <BR>
Technical Approach ..................10-6 <BR>
Design and Analysis .................10-8 <BR>
Future work .........................10-23 <BR>
Conclusions .........................10-23 <BR>
Acknowledgements ....................10-24 <BR>
Availability ........................10-24 <BR>
References ..........................10-24
</BLOCKQUOTE>
<P>
<B><I>11:<A HREF="chap-11.html">
Efficient DES Key Search--An Update by Michael J. Wiener</A> 11-1
</I></B>
<BLOCKQUOTE>
Advancing Technology ................11-2 <BR>
Programmable Hardware ...............11-3 <BR>
Conclusion
............................................................................11-4
</BLOCKQUOTE>
<P>
<B><I>12:<A HREF="chap-12.html">Authors</A>
......................................................................12-1
</I></B>
<BLOCKQUOTE>
The Electronic Frontier Foundation ....................12-1 <BR>
John Gilmore ..........................................12-2 <BR>
Cryptography Research .................................12-2 <BR>
Paul Kocher ...........................................12-3 <BR>
Advanced Wireless Technologies ........................12-3
</BLOCKQUOTE>
<P>
<CENTER><FONT SIZE="-1">
00191 --
Sun Aug 9 19:38:40
</FONT></CENTER>
</BLOCKQUOTE>
<P>
</BODY></HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close