Re: Why crack more than 40bit RC5 keys? (WAS RE: RC5, hiding

James Willard (james@esoteric.ilinks.net)
Sun, 11 May 1997 20:26:58 -0400 (EDT)


-----BEGIN PGP SIGNED MESSAGE-----

> At 07:12 PM 5/11/97 -0400, Nelson Minar wrote:
> >Isn't anyone else worried that the news story is going to read
> > "DES Secure - takes 10,000 computers six months to break one key"
>
> Not really. Because if anyone seriously wanted to break DES, then, they'd
> spend $2000 per computer, buy 60,000 of them (or appropriate numbers of
> eight-processor machines), and crack the key in a month. Plus, no one said
> that you'd only be looking for one key in a real life situation.
> $120,000,000 isn't too expensive for organized crime, or a small country.
> The point is, if technology continues to follow Moore's Law, in 18 months
> it would only take three months to accomplish the same result. And in three
> years, only 6 weeks. The point is that 56-bit encryption is not a good
> solution for the future. Something like 1024-bit definitely is.

Not to mention the purchase of specialized DES cracking equipment which
would be thousands of times more effective for much less than the price of
the equivalent computers.

James Willard

Esoteric - James D. Willard Linux/FreeBSD/Novell/Win/DOS/Minix User
james@esoteric.ilinks.net "He who laughs last,
finger james@esoteric.ilinks.net for PGP Public Key thinks the slowest"
Crack DES Now! http://www.frii.com/~rcv/deschall.htm
.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,.,-=-,

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBM3Zjx0bXLxgz/DWlAQEL9wf/UVmLzwSBNuUQCtuj0qW2gIWqtrb+4M7I
t2bBA0k2tTBm6e/7dzlpuzSiIcOhUitJ0VU2Fp8nF27j+/C+MKtnUvnkrqN2sOaF
rz9MdAG7UOaoXW/qwx8xCL1BmgL0IQ1wLlZGWOAMhV9Uq/eQ/bjNXiFvSnFvVxcb
Ya3StYXsYBJ56adwXJD3QfU7Ic33ZWSSgk3weKiVHBv96RtHU5to3OSO7NBDlO1/
OF7DZkGHcA+n15ExwRPuuEW7pVjiHavYkLbhpEESLgID25Wj36OIXTWvFJvbqmzC
2d5bPepFgFRu24Bjckzgb/hyesOQean/HKjGlQPjWeCfvsxWkhgAog==
=QdnG
-----END PGP SIGNATURE-----