[2189] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Efficient DES Key Search

daemon@ATHENA.MIT.EDU (Rick Smith)
Wed Feb 25 20:04:22 1998

In-Reply-To: <3.0.3.32.19980225184026.03220ee0@postoffice.worldnet.att.net>
Date: Wed, 25 Feb 1998 18:00:16 -0600
To: Will Rodger <rodger@worldnet.att.net>, cryptography@c2.net
From: Rick Smith <rsmith@securecomputing.com>
Cc: markham@securecomputing.com

At 6:40 PM -0500 2/25/98, Will Rodger wrote:

>We've been hearing about all these super-efficient, super cheap,
>_theoretical_ cracking devices for years now. Surely supporters of US
>policy have been ridiculing these assertions for as long as they've been
>made. ...
>My question: when will someone produce one? If I were looking for to
>produce evidence to support decontrol, I'd be working on one now.

I suspect that the custom built, special purpose solution isn't worth it
for the demonstration. Our trivially conceived off the shelf solution is
already within three orders of magnitude of the cost/performance of the
custom built solution. A more careful design and costing effort might
reduce the cost/performance difference to two orders of magnitude or less,
making the custom built solution unnecessary for a dramatic demonstration.



home help back first fref pref prev next nref lref last post