[3055] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: DES Applicability Statement for Historic Status

daemon@ATHENA.MIT.EDU (Bill Sommerfeld)
Thu Jul 23 12:52:32 1998

To: William Allen Simpson <wsimpson@greendragon.com>
cc: cryptography@c2.net
In-Reply-To: Message from William Allen Simpson <wsimpson@greendragon.com> 
   of "Wed, 22 Jul 1998 13:29:07 EDT." <v03130300b1dbcfdb2bef@[207.75.184.71]> 
Date: Thu, 23 Jul 1998 10:38:29 -0400
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>

Bill,

There are several different messages that an "applicability statement"
could deliver.

DES is currently still OK against *many* common threats (e.g., the
"3133t haqer" community) but it clearly cannot resist a determined
adversary with modest resources, and the threshold is clearly dropping
rapidly on all fronts; given the embarassingly parallel nature of the
problem, attacks using general purpose CPU's are likely speeding up
even faster than a naive application of Moore's Law would predict.

The much greater issue (which an applicability statement should focus
on) is the long-term use of DES.

I think that a much more supportable message is:

 1) Protocols should not be tied to specific algorithms, key lengths,
or block sizes.

 2) Anyone currently developing or deploying a *new*
appliation/protocol/system using single-DES (or weaker) is making a
mistake.

 3) Anyone using single-DES (or weaker) algorithms (e.g., kerberos v4)
should migrate away from them at a prudent pace..

					- Bill

home help back first fref pref prev next nref lref last post