Ignore:
Timestamp:
Sep 12, 2010, 12:56:06 PM (11 years ago)
Author:
Paul Lelgemann
Message:

+ Added introductory description for P2PEditor
o Extended description of KeySearcher to include info about distributed calculation using P2P

File:
1 edited

Legend:

Unmodified
Added
Removed
  • trunk/CrypPlugins/KeySearcher/DetailedDescription/Description.xaml

    r1027 r1918  
    2323        The plugin has two IControl interfaces. The first one has to be connected to the algorithm wich should be brute-forced (currently AES, DES or SDES). The second one has to be connected to a CostFunction plugin. The KeySearcher now can control the decryptopn algorithm and uses the cost function to generate an output list of the most probable keys. In the configration bar the user can enter a KeyPattern. This Pattern is a regular expression representing the key space to brute-force. Exampl: 1-1-1-1-1-**-**-** for SDES means that the KeySearcher set the first 6 bits of a SDES key to 1 and changes only the * (* is a wildcard in a KeyPattern). Depending on the connected algorithm the KeyPattern will be set to the default pattern for the algorithm automatically. The second important thing the user can set in the configuration bar is the amount of cores which the KeySearcher is allowed to use.
    2424    </Paragraph>
     25
     26    <Paragraph FontSize="18pt">Peer-to-peer network</Paragraph>
     27    <Paragraph>
     28        This plugin can also be used to demonstrate a distributed attack on any supported symmetric algorithm. To use this feature, enable it in the settings pane by clicking "Use Peer-to-Peer network". The key space will then be equally distributed among participating CrypTool 2.0 instances. Keys are calculated in so-called chunks, whose size you can choose before starting the job. The chunk size specifies the amount of keys calculated in each turn. If you are an experienced user, you can display Peer-to-peer network related information by clicking "Display verbose information". You may find further information about the Peer-to-peer network, how to use it and what it is capable of, in the P2PEditor section. It can be opened by clicking the button with a globe icon labelled P2P in the top pane.
     29    </Paragraph>
     30
    2531    <Paragraph FontSize="18pt">Visualization</Paragraph>
    2632
    2733    <Paragraph>
    28         The KeySearcher plugin offers a QuickWatch showing the "Keys per second" and the probable end-time of the brute-forcing. It also shows a list with the best results in decrypting (using the connected cost-function to calculate a value).
     34        The KeySearcher plugin offers a QuickWatch showing the "Keys per second" and the probable end-time of the brute-forcing. It also shows a list with the best results in decrypting (using the connected cost-function to calculate a value). If you enable the Peer-to-peer-based KeySearcher, the visualization will be expanded and display additional information about the distributed calculation and its results.
    2935    </Paragraph>
    3036    <Paragraph FontSize="20pt">Some useful weblinks</Paragraph>
Note: See TracChangeset for help on using the changeset viewer.