ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-dev: Re: [Wireshark-dev] performing cpu/time intensive computation in a protocol diss

From: Paolo Abeni <paolo.abeni@xxxxxxxx>
Date: Thu, 07 Aug 2008 09:18:46 +0200
hello,

On Wed, 2008-08-06 at 11:17 +0200, Sake Blok wrote:
> Well, if I have understood your code correctly, 

Just to leave praise (or blame :-), for those who really deserve it,
this is not entirely my code, since others have contributed to the patch
(as bugzilla entry reports): Luciano Bello and Maximiliano Bertacchini.

> 2) Change the code to only identify the weak keys, but not use it
>    to decrypt the SSL traffic (would this also be CPU intensive?)

Yes. It will take near exactly the same amount of time and computation
since, in current code, the larger amount of time is spent looping on
candidate weak keys.

Cheers,

Paolo

 
 
 --
 Email.it, the professional e-mail, gratis per te: http://www.email.it/f
 
 Sponsor:
 Stress da fax? Dimentica carta inceppata e toner esauriti. Invia e ricevi i tuoi fax sul PC. Scopri come!
 Clicca qui: http://adv.email.it/cgi-bin/foclick.cgi?mid=8147&d=7-8