Network Security |
||||
Developed from an encryption system called Lucifer from IBM. The plaintext is scrambled based on the encryption key. The key is 56 bits long. Exported products limited to 40 bit keys.
As soon as DES was released, academics, among others, began looking at ways to break it. Initial estimates of machine costs were very high.
The first estimates were of the order of a half a billion dollars (in 1975 dollars!). As processing speed increased the cost estimates came down. These were for brute force software based systems.
Many government, banking, financial, intelligence, military and other orgamisations use DES to encrypt their data for transmission throught their own and external networks.
Task set at the 1997 annual RSA Cryptographic trade show in San Francisco.
1997 - 5 months
1998 - 39 days!
Any encryption system can be cracked by an exhaustive search through the key space. This is the brute force method. What is significant about the EFF DES Cracker is that it reduces the question of how hard is it, to, how fast a solution can you afford!
This is the book, written by members of the Electronic Frontier Foundation, published by O’Reilly.
It provides complete details of the construction of a machine for cracking DES cryptograms. The software is listed and the philosophy behind it is discussed.
The cost of the machine is about $US 200,000. Less if the labour is provided cheaply.
Encryption systems have always appealed to those with a penchant for solving puzzles. Mostly, this interest has been personal or academic. Many papers have been written on the subject of breaking the DES algorithm. The EFF members who built the DES
Cracker based their developments on these and their own researches.
A significant part of the DES Cracker is that the actual cracking engine is built with simple (and cheap) off-the-shelf Integrated Circuits.
Using standard components means that scale efficiencies can be achieved at low cost. The actual process breaks the task into many discrete components that are then run simultaneously.
The processing modules are controlled by a PC. The PC software is uncomplicated. It merely sets the tasks for the processing modules and monitors their progress. Each module tries decryption keys in sequence until it generates a possible good message.
The PC program checks the possible good message and proceeds with further checks. Meanwhile the processing modules carry on cracking.
EFF Web Site: http://www.eff.org
O’Reilly Web Site: http://www.oreilly.com
Web Author: Geoff May.
Last Update: 08/09/98 Copyright © 1998 by Network Business Services Pty Ltd. All Rights Reserved. |