1996-07-23 - Re: Brute Force DES

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: trei@process.com
Message Hash: 564041258c650e2a93ad5c3b75b08d53b439ce66ca3a111dbf33c492fbaae560
Message ID: <199607231338.JAA15819@jekyll.piermont.com>
Reply To: <199607222043.NAA06313@toad.com>
UTC Datetime: 1996-07-23 18:00:29 UTC
Raw Date: Wed, 24 Jul 1996 02:00:29 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Wed, 24 Jul 1996 02:00:29 +0800
To: trei@process.com
Subject: Re: Brute Force DES
In-Reply-To: <199607222043.NAA06313@toad.com>
Message-ID: <199607231338.JAA15819@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



"Peter Trei" writes:
> The fastest general purpose, freely available des implementation I'm
> aware of is libdes. by Eric Young. With this, I can do a set_key in 
> 15.8 us, and an ecb_encrypt in 95 us/block. That adds up to 
> about 9,000 keytests/sec (this is on a 90 MHz P5, running NT).

I'll point out that like most DES implementations, Eric's tries to
spend a lot of time in key setup to save time later on in
encryption/decryption. This tradeoff would probably be very different
if you didn't plan on trying more than one or two blocks of decryption
after getting a key.

Perry





Thread