A presentation of mine discussing the significance and intermediate application of cryptography for most modern systems. There is also a proof of concept discussing what weaknesses lie in modern cryptographic hash functions.
Wordlist used: Probable Wordlists
Rule used: One Rule to Rule Them All
— Rayce Toms
Student Researcher
Comments
Post a Comment