[2187] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Efficient DES Key Search

daemon@ATHENA.MIT.EDU (Will Rodger)
Wed Feb 25 19:56:46 1998

Date: Wed, 25 Feb 1998 18:40:26 -0500
To: yhp <iclysdal@thetoybox.org>, cryptography@c2.net
From: Will Rodger <rodger@worldnet.att.net>
Cc: perry@piermont.com, markham@securecomputing.com,
        rsmith@securecomputing.com, ptrei@securitydynamics.com
In-Reply-To: <199802252142.QAA02351@thetoybox.org>

At 04:42 PM 2/25/98 -0500, yhp wrote:
>Continuing along Perry's line of thought...
>
>A reference to a much more cost/speed effective method for breaking DES is
>Mike Wiener's paper on "Efficient DES Key Search," which is available at
>ftp://ripem.msu.edu/pub/crypt/docs/des-key-search.ps
>
>It outlines a design for a machine that could be built for $1 million dollars
>which would find a DES key in, on average, about 3.5 hours.  This was using
>hardware available in 1993 - one suspects that the machine could most likely
>be further optimized given modern technology.

OK, I have to ask.

We've been hearing about all these super-efficient, super cheap,
_theoretical_ cracking devices for years now. Surely supporters of US
policy have been ridiculing these assertions for as long as they've been made.

There are many, many companies and individuals who could join together to
bankroll these things.

My question: when will someone produce one? If I were looking for to
produce evidence to support decontrol, I'd be working on one now.

Just wondering.......





Will Rodger                                           Voice: +1 202-408-7027 
Washington Bureau Chief                        Fax: +1 202-789-2036
Inter@ctive Week                    http://www.interactiveweek.com
A Ziff-Davis Publication            http://www.zdnn.com
PGP 5.0: 584D FD11 3035 0EC2 B35C AB16 D660 293F C7BE 3F62
       PGP 2.6.2: D83D 0095 299C 2505 25FA 93FE DDF6 9B5F

home help back first fref pref prev next nref lref last post