Confirmed users
908
edits
m (→Attacks: typo) |
|||
| Line 36: | Line 36: | ||
minimizing the cost of each attempt. | minimizing the cost of each attempt. | ||
'''Remember:''' the cost figures described below are talking about an attacker who has already surmounted the difficult hurdle of breaking into a professionally-managed highly secure | '''Remember:''' the cost figures described below are talking about an attacker who has already surmounted the difficult hurdle of breaking into a professionally-managed highly secure server, either by force, coersion, or subpoena. These attacks are not available to a passive eavesdropper or a network-side man-in-the-middle: those folks don't have any feasible attack. | ||
=== PBKDF User/Attacker Costs === | === PBKDF User/Attacker Costs === | ||