[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Double DES calculations



Hal Finney wrote:

> I'll give you one similar example, though.  I think this is the technique
> used in Pollard "rho" factoring.  You have an iterated series, x=f(x), and
> you want to know if it has any cycles, any values which are eventually
> repeated.  At first glance you might think that to look for a cycle of
> length N you would have to store N values of the series and check each
> value for a match, taking order of N in time and space.  The Pollard tech-
> nique instead runs two copies of the iteration at once, one twice as fast
> as the other: x=f(x) and y=f(f(y)).  Each time you just compare x and y
> for a match.  This takes about twice as long but uses no memory.

The thread was concerning the vulnerability of Double-DES with an
intermediate layer of IDEA in the middle.  It was proposed that if IDEA
could ultimately be TRIVIALLy cracked, then DES-IDEA-DES was no stronger
than Double-DES.  At that point I did some "back of the envelope"
calculations on the cost of breaking Double-DES using a MITM attack.

I'm not sure how "cycles" fit into DES.  The brute-force technique I was
hypothesizing involved trying all possible keys on the encrypt and decrypt
sides, storing them the resultant 64 bit blocks (all 2^60 bytes of them),
then comparing them.  How would Pollard rho speed that up?

 /--------------+------------------------------------\
 |              |  Internet: [email protected]   |
 | Dave Sparks  |  Fidonet:  Dave Sparks @ 1:207/212 |
 |              |  BBS:      (909) 353-9821 - 14.4K  |
 \--------------+------------------------------------/