|
September 05, 2012, 02:15:18 PM |
|
When you're brute-forcing a cryptographic algorithm or, for that matter, a cryptographic hash, you're just trying test vector X, test vector X+1, test vector X+2 and so on. Thus, on the input side you have some bits which can be pre-set via USB and some bits which originate from a counter.
There is no output (and thus, no further input either) until one of two things happen: 1. a match is found 2. the counter is exhausted
|