1996-07-24 - Brute-forcing DES

Header Data

From: trollins@interactive.visa.com (Tom Rollins)
To: cypherpunks@toad.com
Message Hash: e8055bd4dbb153c4ac8e61d5319d1c633ef05fce058523deb8285474b9b30292
Message ID: <199607242034.QAA29999@rootboy.interactive.visa.com>
Reply To: N/A
UTC Datetime: 1996-07-24 23:50:18 UTC
Raw Date: Thu, 25 Jul 1996 07:50:18 +0800

Raw message

From: trollins@interactive.visa.com (Tom Rollins)
Date: Thu, 25 Jul 1996 07:50:18 +0800
To: cypherpunks@toad.com
Subject: Brute-forcing DES
Message-ID: <199607242034.QAA29999@rootboy.interactive.visa.com>
MIME-Version: 1.0
Content-Type: text


Hi,

Anyone have a FPGA chip PCI board layout that they would like to
share. Having seen the paper "Minimal Key Lengths for Symmetric
Ciphers to Provide Adequate Commercial Security", the FPGA chip
seems like a perfect addition to my pc. Count me in...

Thanks,
-tom

> Any one up for a distributed brute force attack on single DES? My 
> back-of-the-envelope calculations and guesstimates put this on the
> hairy edge of doability (the critical factor is how many machines can
> be recruited - a non-trivial cash prize would help). 

-- 
Tom Rollins   <trollins@interactive.visa.com>






Thread