Talk:Brute-force attack/to do


 * Discussion of TWINKLE and TWIRL
 * Add an overview of suggested hardware designs for key search.
 * Discuss hash collision search; MD5CRK
 * Discuss Time-memory tradeoffs
 * Briefly survey the cracking challenges (RC5, DES etc)
 * Types of attacks
 * Attacks on wireless networks
 * Tools used for brute force attacks