Speaker
Ms
Elitsa Petkova
(Bulgaria)
Description
The rapid development of quantum technologies leads to new possibilities applying certain cryptographic attacks against symmetric algorithms. This paper discusses a verifying method an different approach to applying an "Brute force" attack on 256 - AES encrypted voice stream. While the classical attack application emphasizes computing power, here the focus is on signal processing.
Authors
Ms
Elitsa Petkova
(Bulgaria)
Mr
Mario Angelov
(Bulgaria)