[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Can we kill single DES?
"Peter Trei" writes:
> Since it looks like the US government will be allowing the export of
> 56 bit espionage-enabled software, it's time to kill single DES.
Double plus agreed.
> On this type of processor, it would still take 9133 years to exhaust
> a 56 bit key space. On the other hand, on 20,000 processors of this
> power it would take less than 6 months. If the target is encrypted
> in a chaining mode with an unknown 8 byte IV, the time more than
> doubles.
>
> Clearly, this goes far beyond the number of cpus available to the
> members of this list (though well within the power of most governments
> and many corporations)
>
> The best idea I've heard for recruiting this many cpu cycles is to create
> a screen saver which does DES-cracking while machines are idle.
> Another incentive is to offer a cash prize to the person(s) who find the
> key.
These are both possibilities.
> 1. Is this a good idea? What will happen if DES becomes perceived
> as insecure?
Well, I believe that we are better off if the general perception
catches up with reality.
> 2. What is the probability of success required to make it worth doing?
We need 50% success in one month to make it reasonably worthwhile.
> 3. What would be the consequences of failure?
I don't think we will fail :)
> 4. What other platforms than NT/Win95/Pentium should be considered?
> I could write a Unix demon version, but unless it's tailored for the
> cpu, a lot of efficency is lost
> (The aggregate number of idle cycles available for testing is the
> crucial number).
Other CPUs: MC68k, PowerPC, SPARC and Alpha versions, in roughly that
order.
> 5. What's a good target?
Good question :)
> Assume that the program will be a Win95/NT screen saver or
> Unix deamon.
An X screen saver would also be good. Lots of
Linux/FreeBSD/NetBSD/BSDI weenies in the world.
Perry