From: mpd@netcom.com (Mike Duvos)
To: cryptography@c2.net
Message Hash: c5d094e2b1d8f0d074f81ccc52d28ecdebe47786bac78c0f1fffba2d34f13477
Message ID: <199701070256.SAA00819@netcom8.netcom.com>
Reply To: N/A
UTC Datetime: 1997-01-07 02:56:59 UTC
Raw Date: Mon, 6 Jan 1997 18:56:59 -0800 (PST)
From: mpd@netcom.com (Mike Duvos)
Date: Mon, 6 Jan 1997 18:56:59 -0800 (PST)
To: cryptography@c2.net
Subject: The Upcoming DES Challenge
Message-ID: <199701070256.SAA00819@netcom8.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
Peter Trei (trei@process.com) writes:
> 1. I'm astonished at the low level of reaction RSA's
> announcement that they will be sponsoring a DES Challenge,
> with a $10,000 cash prize.
I'm certainly jumping up and down and cheering. I said a while
back that the life expectancy of DES would be about two weeks if
anyone forked over serious cash.
I'm also pleased to see they will be offering prizes for trying
to break Ron Rivest's new RC5 cipher, which scrambles using data
dependent rotates as its only non-linear operation. This is very
speedy, and if it turns out to be robust, will be a nice fast
efficient drop-in replacement for most other popular block
ciphers.
> I've been working with people at RSA to get this set up. It looks
> like there'll be an ascii-plaintext challenge (we won't know the
> full plaintext - just that it's ascii, and long enough to be
> unambigious), and the full prize will go the first person who
> emails them the key.
Ick. Why overly complexify things? A known plaintext attack
would be far more straightforward. After all, the goal is to
recover the key, not the message. Having to find a key which
decrypts to something having all high bits clear will discourage
people who might want to take a crack at this independent of the
canned program you are going to distribute.
[snip]
> It will NOT run as a screen saver.
Too bad. The screensaver paradigm is something the unwashed
masses can easily understand.
> The very first time it is started up on a given machine, if
> it is not given a specific chunk at which to start, it will
> pick one at random. The checkpointing scheme means that on
> later runs, it will pick up where it left off, advancing to
> the next chunk as it completes each one.
This is VERY IMPORTANT. Unlike factoring problems, where the
data supplied by people can be checked in a small fraction of the
CPU time used to generate it, searching a keyspace is very
vulnerable to sabotage or stupidity on the part of the people
doing the searching. It is well worth the extra factor of 2-3 to
guarantee that the exercise will eventually terminate.
Sounds good, but I would prefer matching plaintext and ciphertext
with the goal of recovering the key. This is really the
situation that would exist for someone tapping financial data on
a line, and knowing the plaintext of a transaction he
deliberately generated for testing purposes.
K.I.S.S.
--
Mike Duvos $ PGP 2.6 Public Key available $
mpd@netcom.com $ via Finger. $
Return to January 1997
Return to “Steve Reid <steve@edmweb.com>”