[1137] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Better DES challenge update

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Tue Jul 1 16:17:11 1997

From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: cryptography@c2.net, mab@crypto.com
Reply-To: pgut001@cs.auckland.ac.nz
X-Charge-To: pgut001
Date: Tue, 1 Jul 1997 19:26:24 (NZST)

>>Hmm, I'll donate 1024 bits to building a low-end DES-cracking machine,
>>contingent on a plausible plan.  After a demonstration, the consortium
>>sets a deadline at which des-is-dead.penet.fi goes online with a free
>>forms-based service, first-come/first-served.  Strong crypto vendors
>>should fall all over themselves for ad space.
>Frankly, I don't understand why someone hasn't done this already.  According
>to the rough estimates we came up with for the 1995 "minimum key length"
>study (<ftp://research.att.com/dist/mab/keylength.txt>), based on Michael
>Wiener's ASIC-based and Eric Thompson's FPGA-based designs, this should
>be do-able within the budget of a small company or group of individuals.
 
It almost was done last year.  A company (which shall remain anonymous) had 
the funding set aside to build a DES breaker, it got to the point of "Do we go 
with the ASIC guys (a DES key every 3 minutes) or the FPGA guys (every n days, 
but retargettable for other algorithms)?".  It was just a case of signing 
agreements and handing over the money, and the manufacturers would have 
started churning out the hardware (the design (and in the FPGA case the 
firmware) was complete, the politics had been sorted out, etc).  The project 
was cancelled at the last minute due to issues unrelated to crypto or 
politics.
 
Their motivation for doing it was that they were preparing an internationally 
available e-commerce system which offered security which was significantly 
better than the 40-bit or DES-based stuff which most people were (and still 
are) using.  By being able to say "We can break (virtually) anything everyone 
else is using in 3 minutes" (or whatever, for the retargetable FPGA-based 
system), they'd get the worlds attention, and once they had it they'd use this 
to market their own product (which used triple DES and other, similar-strength 
algorithms).
 
This is an example of a DES-breaker being built not by a government or large 
corporation or criminal organisation intent on attacking message traffic, but 
by a smallish company who's only interested in the publicity - they fully 
accepted that they'd probably end up throwing it away (or selling chunks of it 
as souvenirs) after they'd demonstrated it to reporters, but decided that the 
publicity they'd get from it was worth far more than the cost of building the 
thing.
 
Peter.
 


home help back first fref pref prev next nref lref last post