• Discussion of TWINKLE and TWIRL
  • Add an overview of suggested hardware designs for key search.
  • Discuss hash collision search; MD5CRK
  • Discuss Time-memory tradeoffs
  • Briefly survey the cracking challenges (RC5, DES etc)
  • Types of attacks
  • Attacks on wireless networks
  • Tools used for brute force attacks