1996-10-02 - Re: Can we kill single DES?

Header Data

From: Lucky Green <shamrock@netcom.com>
To: Peter Trei <trei@process.com>
Message Hash: adb9b47f662861a4903f0dea19b8e44d89032e919c28481f55dce0e71af43ac9
Message ID: <Pine.3.89.9610011638.A7805-0100000@netcom14>
Reply To: <199610012026.NAA28151@toad.com>
UTC Datetime: 1996-10-02 03:15:22 UTC
Raw Date: Wed, 2 Oct 1996 11:15:22 +0800

Raw message

From: Lucky Green <shamrock@netcom.com>
Date: Wed, 2 Oct 1996 11:15:22 +0800
To: Peter Trei <trei@process.com>
Subject: Re: Can we kill single DES?
In-Reply-To: <199610012026.NAA28151@toad.com>
Message-ID: <Pine.3.89.9610011638.A7805-0100000@netcom14>
MIME-Version: 1.0
Content-Type: text/plain





On Tue, 1 Oct 1996, Peter Trei wrote:

> Since it looks like the US government will be allowing the export of 
> 56 bit espionage-enabled software, it's time to kill single DES.
> 
> As some of you will recall, a while back I wondered aloud about the
> feasibility of brute-forcing DES on general purpose machines, ala the
> RC4-40 crack last year. 
[...]

> Yes, I KNOW that a hardware based cracker is a LOT more efficient,
> but between the up-front cost and the difficulty of design and production,
> it's less likely to get done.  (Still if someone wants to buy me a nice
> FPGA board, I'll see what I can do).

I understand that *two* independent efforts cracking single DES using FPGAs 
are currently being set up. If the parties whish to come forward, my offer 
to donate to this cause still stands.

--Lucky





Thread