[3044] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

DES Applicability Statement for Historic Status

daemon@ATHENA.MIT.EDU (William Allen Simpson)
Wed Jul 22 16:32:55 1998

Date: Wed, 22 Jul 1998 13:29:07 -0400
To: cryptography@c2.net
From: William Allen Simpson <wsimpson@greendragon.com>


I'm looking for additional references and comments for this prospective draft,
although it must be kept as blunt and concise as possible.  Any ideas?





Abstract

   "The ESP DES-CBC Transform" [RFC-1829] and "The PPP DES Encryption
   Protocol" [RFC-1969] have been re-classified to Historic status, and
   implementation is Not Recommended.  This Applicability Statement pro-
   vides the supporting motivation for that classification.  The primary
   reason is that DES alone provides insufficient strength for the pro-
   tection of moderate value information for any length of time.


1.  Introduction

   The US Data Encryption Standard (DES) algorithm [FIPS-46] has had a
   long history of analysis since its adoption in 1977.  At the time of
   RFC-1829 publication in 1995, briefly citing the current analysis and
   describing known limitations, it was suggested that DES was not a
   good algorithm for the protection of moderate value information.
   However, the level of confidentiality provided by the use of DES in
   the Internet environment was considered greater than sending the
   datagrams as cleartext.

   Recently, RSA Data Security issued a series of challenges to demon-
   strate the current effectiveness of various key lengths.  Each chal-
   lenge has a shorter time for completion.

   The first DES challenge of January, 1997, was solved in 140 days on
   June 17, 1997, but only searching 25% of the key space.  On average,
   half of the key space can be expected to be searched.  Much of the
   time was spent organizing competing volunteer efforts.  The hidden
   message was `OStrong cryptography makes the world a safer place.'O

   The second DES challenge of January 13, 1998, was solved in 40 days
   on February 23, 1998, after searching over 88% of the key space using
   thousands of Internet hosts in their spare time.  The hidden message
   was "Many hands make light work."

   The third DES challenge of June 13, 1998, was solved by June 16,
   1998, after only 2.5 days, rather than the anticipated 10 days.  The
   winner was a single purpose built machine sponsored by Electronic
   Frontier Foundation (EFF).  The hidden message was "It's time for
   those 128-, 192-, and 256-bit keys."


2.  Problems

   DES has a number of problems that restrict its usability in the
   global Internet.


2.1.  Key Length

   Even at the time of DES publication, the analytic community ques-
   tioned the DES 56-bit key length for long-term use [DH77].  Since
   that time, numerous studies have predicted the work factors of vari-
   ous key lengths, and the trade-offs between cost, memory, and time
   [Schneier95, which newer papers should we cite?]


2.2.  Time

   Since 1977, the analytic community has predicted a purpose-built DES
   cracking machine could be built for 10 to 20 million US Dollars that
   would recover a key within 1 to 2 days [DH77, Hellman79, Diffie81].
   More recently, [Weiner94] sketched the design of a DES cracking
   machine for 1 million US Dollars that would recover a key every 3.5
   hours.  This amount is within the reach of most governments and large
   organizations.  Anecdotal evidence suggests that some governments
   have built such a machine.

   It has been suggested that DES might still be useful for short-lived
   data.  The DES challenge has shown that the cost versus time for
   recovery curve has advanced more rapidly than predicted.  A deter-
   mined attacker has or will soon have the capability to recover any
   DES key within seconds.


2.3.  Value

   The reported cost of non-recurrent engineering and first prototype
   for the EFF machine was 250 thousand US Dollars, and can recover any
   key in under 7 days.  Additional machines can be built for 50 thou-
   sand US Dollars [???].  This amount is well within the reach of most
   small organizations.

   Assuming that a 50 thousand US Dollar DES cracking machine has a use-
   ful service lifetime of 3 or more years, the amortized cost of recov-
   ering any single key is less than 320 US Dollars.  This is signifi-
   cantly less than the value of common consumer transactions.

   Moveover, the cost of deploying and maintaining Internet firewalls
   and Virtual Private Networks exceeds the cost of recovering the DES
   confidential data.  There is no longer any cost benefit over sending
   the datagrams as cleartext.

   Furthermore, DES confidential data of any significant value in the
   past 20 years has become a ripe target for key recovery.


3.  Recommendations

   Key lengths less than 80 bits are not acceptable for protecting
   short-lived Internet data.

   Key lengths less than 128 bits are not acceptable for protecting
   long-lived Internet data.

   Currently deployed equipment using DES should be eliminated, or
   upgraded to a more robust algorithm and key length.

   Existing data depending upon DES for confidentiality should be con-
   sidered compromised.


Security Considerations

   Specific security limitations are described in the relevant sections.


Acknowledgements



References

   [DH77]      Diffie, W., and Hellman, M.E., "Exhaustive Cryptanalysis
               of the NBS Data Encryption Standard", Computer, v 10 n 6,
               June 1977.

   [Diffie81]  Diffie, W., "Cryptogrpahic Technology: Fifteen Year For-
               cast", BNR Inc., January 1981.

   [FIPS-46]   US National Bureau of Standards, "Data Encryption Stan-
               dard", Federal Information Processing Standard (FIPS)
               Publication 46, January 1977.

   [Hellman79] Hellman, M.E., "DES Will Be Totally Insecure within Ten
               Years", IEEE Spectrum, v 16 n 7, July 1979.

   [Schneier95]
               Schneier, B., "Applied Cryptography Second Edition", John
               Wiley & Sons, New York, NY, 1995.  ISBN 0-471-12845-7.

   [Weiner94]  Wiener, M.J., "Efficient DES Key Search", School of Com-
               puter Science, Carleton University, Ottawa, Canada,
               TR-244, May 1994.  Presented at the Rump Session of
               Crypto '93.



home help back first fref pref prev next nref lref last post