[2187] in cryptography@c2.net mail archive
Re: Efficient DES Key Search
daemon@ATHENA.MIT.EDU (Will Rodger)
Wed Feb 25 19:56:46 1998
Date: Wed, 25 Feb 1998 18:40:26 -0500
To: yhp <iclysdal@thetoybox.org>, cryptography@c2.net
From: Will Rodger <rodger@worldnet.att.net>
Cc: perry@piermont.com, markham@securecomputing.com,
rsmith@securecomputing.com, ptrei@securitydynamics.com
In-Reply-To: <199802252142.QAA02351@thetoybox.org>
At 04:42 PM 2/25/98 -0500, yhp wrote:
>Continuing along Perry's line of thought...
>
>A reference to a much more cost/speed effective method for breaking DES is
>Mike Wiener's paper on "Efficient DES Key Search," which is available at
>ftp://ripem.msu.edu/pub/crypt/docs/des-key-search.ps
>
>It outlines a design for a machine that could be built for $1 million dollars
>which would find a DES key in, on average, about 3.5 hours. This was using
>hardware available in 1993 - one suspects that the machine could most likely
>be further optimized given modern technology.
OK, I have to ask.
We've been hearing about all these super-efficient, super cheap,
_theoretical_ cracking devices for years now. Surely supporters of US
policy have been ridiculing these assertions for as long as they've been made.
There are many, many companies and individuals who could join together to
bankroll these things.
My question: when will someone produce one? If I were looking for to
produce evidence to support decontrol, I'd be working on one now.
Just wondering.......
Will Rodger Voice: +1 202-408-7027
Washington Bureau Chief Fax: +1 202-789-2036
Inter@ctive Week http://www.interactiveweek.com
A Ziff-Davis Publication http://www.zdnn.com
PGP 5.0: 584D FD11 3035 0EC2 B35C AB16 D660 293F C7BE 3F62
PGP 2.6.2: D83D 0095 299C 2505 25FA 93FE DDF6 9B5F