From: Steve Reid <root@edmweb.com>
To: trei@process.com
Message Hash: 29cff6279b79fa2a258be1d341eb36a28b7d323593ebdf78d782886549bc7194
Message ID: <Pine.BSF.3.91.960722194822.187A-100000@bitbucket.edmweb.com>
Reply To: N/A
UTC Datetime: 1996-07-23 06:12:56 UTC
Raw Date: Tue, 23 Jul 1996 14:12:56 +0800
From: Steve Reid <root@edmweb.com>
Date: Tue, 23 Jul 1996 14:12:56 +0800
To: trei@process.com
Subject: Brute-forcing DES
Message-ID: <Pine.BSF.3.91.960722194822.187A-100000@bitbucket.edmweb.com>
MIME-Version: 1.0
Content-Type: text/plain
> Any one up for a distributed brute force attack on single DES? My
> back-of-the-envelope calculations and guesstimates put this on the
> hairy edge of doability (the critical factor is how many machines can
> be recruited - a non-trivial cash prize would help).
Count me in. I've got a couple of net-connected Pentiums that are mostly
idle.
Did you consider the possibility of DES chips in your back-of-the-envelope
calculations? They are hundreds of times faster than PCs. I don't know
where to get them or how much they cost, though. I would expect they
wouldn't be too expensive. The cash might be better spent on DES chips
than on a prize.
Might be able to bring some money in by selling "I Helped Crack DES And
All I Got Was This Lousy T-shirt" T-shirts.
=====================================================================
| Steve Reid - SysAdmin & Pres, EDM Web (http://www.edmweb.com/) |
| Email: steve@edmweb.com Home Page: http://www.edmweb.com/steve/ |
| PGP (2048/9F317269) Fingerprint: 11C89D1CD67287E68C09EC52443F8830 |
| -- Disclaimer: JMHO, YMMV, TANSTAAFL, IANAL. -- |
===================================================================:)
Return to July 1996
Return to “Steve Reid <root@edmweb.com>”
1996-07-23 (Tue, 23 Jul 1996 14:12:56 +0800) - Brute-forcing DES - Steve Reid <root@edmweb.com>