Key distribution protocol involves only 2 parties, given E[k1,E(k2,m)]=E[k2, E(k1, m)]

Given an one-key cipher such that:
E[k1,E(k2,m)]=E[k2, E(k1, m)]
Is there any key distribution protocol that involves only two parties (Alice and Bob) without the key distribution center?
The protocol should allow Alice to send a session k… Continue reading Key distribution protocol involves only 2 parties, given E[k1,E(k2,m)]=E[k2, E(k1, m)]

Generating passwords with rule: the contents within a 10 characters string must maintain a certain ratio of numbers and letters in no particular order

I’m playing around with Kali and am looking to crack my WPA2 default password.

I started generating 10 character passwords with a charset of solely digits and upper alpha lastnight and after 10 mins, I had a 40gb text file a… Continue reading Generating passwords with rule: the contents within a 10 characters string must maintain a certain ratio of numbers and letters in no particular order