From: Joe Thomas <jthomas@pawpaw.mitre.org>
To: cypherpunks@toad.com
Message Hash: ab834cf77b8e2b22b23c3e66a1a39628e9ade7a5c49eda5f3f73506cee8efe71
Message ID: <9310141814.AA14779@pawpaw.mitre.org>
Reply To: N/A
UTC Datetime: 1993-10-14 18:16:58 UTC
Raw Date: Thu, 14 Oct 93 11:16:58 PDT
From: Joe Thomas <jthomas@pawpaw.mitre.org>
Date: Thu, 14 Oct 93 11:16:58 PDT
To: cypherpunks@toad.com
Subject: Re: DES
Message-ID: <9310141814.AA14779@pawpaw.mitre.org>
MIME-Version: 1.0
Content-Type: text/plain
> > 2) How much longer would it take to break triple DES versus
standard DES
> > using one of the key-breaking machines described?
>
> Using brute force, it would take the cube of the
> time it takes to break single DES.
Hmm... I can't figure out what it would mean to cube time. For
two-key (112 bit) triple DES, it should be 2^56 times longer to
exhaustively search the keyspace, with three keys, 2^112 times
longer. This assumes the keysearch engine is pipelined, so each
trial encryption takes the same amount of time, despite the
additional rounds. Such a machine would cost more, of course, since
it would have a longer pipeline, but wouldn't otherwise be
significantly different in design.
Back-of-the-envelope calculation: a design like the "7-hour
exhaustive keysearch" engine for 2-key triple DES would take 50
trillion years or so to exhaust the keyspace. That's for a cost on
the order of $1 million (it should be buildable for less than three
times the cost of the 56-bit key version).
Seems secure, but as Perry says,
> Whether a more sophisticated techinque is possible is unknown.
Joe
Return to October 1993
Return to ““Perry E. Metzger” <pmetzger@lehman.com>”