And so it's still going to require a brute-force attack.
And now the attacker has, at their leisure, the time to do this massive brute-force attack.
This is the best way to protect against the brute-force attack.
Both technologies try to transport the benefits of parallel processing to brute-force attacks.
We've talked about it, I mean, peripherally, things like brute-force attacks.
Now, we've never discussed brute-force attacks against public key encryption, which is the reason this question caught my attention.
So the reason you do these multiple rounds is to slow down any brute-force attacks.
But other algorithms may have much lower work factors, making resistance to a brute-force attack irrelevant.
But simple ones may be vulnerable to a brute-force attack.
That jumps us back up to three-point-something years, on average, for a brute-force attack to happen.