[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Better DES challenge update



------- Blind-Carbon-Copy

To: [email protected]
Subject: Better DES challenge update
Date: Fri, 27 Jun 1997 18:01:53 -0400
From: Matt Blaze <[email protected]>

The prize for solving the ``better DES challenge'' has grown to almost
$500 and continues to rise daily.  Here's the list of prize pledges I have
as of June 27; the current pot stands at 3984 bits (US $498.00).  I hope
to have a web page up sometime next week (on www.crypto.com) with the
latest challenge status.  (This will be the last update via email, unless
someone solves the challenge or pledges some huge prize or some such).

DATE	Name			Email				Bits Pledged
============================================================================
6/22/97	Matt Blaze		[email protected]			56 bits
6/23	AT&T Labs (via mab)	[email protected]		56
6/24	Steve Gibbons		[email protected]		56
6/24	Bill Stewart		[email protected]		112
6/24	Peter Trei		[email protected]		288
6/24	Jim Thompson		[email protected]	512
6/25	Adam Shostack		[email protected]		512
6/25	Eric Blossom		[email protected]			1024
6/26	Jamie Lawrence		[email protected]			56
6/26	Bill Frantz 		[email protected]		512
6/27	Jon Leonard		[email protected]	800
								=========
GRAND TOTAL (Bits)						3984
GRAND TOTAL (USD)						$498.00

Tell your friends!  Note that the pot seems to be growing roughly
exponentially.  If this keeps up, I may join the search myself...

[Unfortunately, due to singularly inexcusable incompetence on the part
of my soon-to-be-former ISP (PSINet), mail to me was bouncing last week
so I may have missed some of the ``Better DES Challenge'' pledge mail.
If you pledged a prize and aren't on the list above, please resend.]

Official rules attached below for reference.

- -matt

N.B.  The ``bit'' is an archaic unit of currency equal to 1/8 of a US
dollar (hence, ``pieces of eight,'' ``two bits,'', etc.).  It seems an
appropriate measure for prizes in key-cracking contests.

============================

From: Matt Blaze <[email protected]>
Subject: A better DES challenge
Date: Mon, 23 Jun 1997 16:04:25 -0400

I'm not a big fan of these ``challenges'' in which a prize is awarded
to the first person who discovers the key that produces some
plaintext/ciphertext pair.  The effort required to produce a solution
tends to grossly overstate the actual difficulty of searching the
keyspace, since invariably the winner uses the idle time on
general-purpose computers, which are poorly-optimized for use as
keysearch engines.

Another problem with challenges is that even when they are broken
they don't really provide convincing proof that the keyspace was
actually searched.  For example, in the recent 56-bit RSA DES
challenge, RSA has no way to prove that it didn't ``leak'' some hint
about the solution to the winner. (I hasten to point out that I'm not
suggesting that anything like this actually happened, only that a
skeptic might raise the possibility, against which RSA has no real way
to defend itself).  A better challenge, then, would be one in which
even the challenger doesn't know the solution in advance (or would
have had to itself search the keyspace or otherwise cryptanalyze the
cipher in order to find it).  For example, a challenge for a one-way
collision-intractable hash function could simply ask for an example of
a collision, or could ask for the inversion of some well-structured
output (such as all zeros).

We can do the same thing for encryption functions.  I propose an
alternative DES challenge that can be solved only by searching a large
fraction of the keyspace or by cryptanalyzing the cipher.  The
structure of the challenge is such that most people would agree that
either I don't know the solution myself or that I've already searched
the keyspace or otherwise cryptanalyzed DES in some way.  In other
words, the only way I could covertly ``help'' the challenge winner is
if I've already done what the challenge is supposed to establish is
possible in the first place.

Recall that there are 2^56 DES keys that each select a different
permutation of the 2^64 codebook entries.  We expect that there's
about a 1/2^8 chance that there exists a DES key that converts any
given plaintext block to any given ciphertext block.

My challenge is to find a key such that a ciphertext block of the form
<XXXXXXXX> decrypts to a plaintext block of the form <YYYYYYYY>, where
X and Y represent any fixed eight-bit byte value repeated across each
of the eight bytes of the block.

Observe that I'm actually posing 2^16 different challenge
plaintext/ciphertext pairs, each with about 1/2^8 probability of
having a solution, where groups of 2^8 challenges can be searched for
simultaneously.  Each challenge may have no solution key, exactly one
solution key, or more than one solution key, but it is very likely
that there is at least one solution key to at least one of them (in
fact, one could expect to find about 2^8 solutions overall, assuming
DES produces good pseudorandom permutations).

The most obvious way to find a solution is try, for each
properly-formed ciphertext block, every key in the DES keyspace until
a plaintext block of the proper form is found.  Special-purpose
hardware, based on FPGAs or ASICs, would obviously be helpful for this
purpose.  (One might first consider the eight weak / semi-weak DES
keys that have 2^32 fixed points, on the chance that one of the blocks
of this form is a fixed point for one of them.  Unfortunately however,
none are.)

I will award a grand prize of fifty six bits ($7 US dollars) to the first
person to provide a solution key.  (The challenge ends when first key
is found).  While the prize money is admittedly trivial (this is out
of my own pocket, after all), I hope it will serve as ``seed money''
that encourages others to add their own prizes to a growing pot.

Of course, I cannot be completely sure whether there exist any
solutions at all.  In the (unlikely) event that there is no winner by
August 1, 1999, I will award the 56 bit prize to the person who submits
the key that produces the most ``interesting'' plaintext block from
the all-zero ciphertext block.  I will be the final judge of what
constitutes interesting.  This prize will be announced at the rump
session of CRYPTO'99.

Void where prohibited by law, etc.  Comments, questions and solutions
should be submitted by email, to <[email protected]>.  If others wish
to pledge additional prizes, please also let me know at that address
and I'll keep track of who is offering what, etc..

- -matt

------- End of Blind-Carbon-Copy