1997-06-27 - Better DES challenge update

Header Data

From: Matt Blaze <mab@crypto.com>
To: N/A
Message Hash: 7c4556b580206b39b1d43430000a44faa1af739e032a8dbcc6a5999464075bfd
Message ID: <199706272201.SAA25446@crypto.com>
Reply To: N/A
UTC Datetime: 1997-06-27 22:02:01 UTC
Raw Date: Fri, 27 Jun 1997 15:02:01 -0700 (PDT)

Raw message

From: Matt Blaze <mab@crypto.com>
Date: Fri, 27 Jun 1997 15:02:01 -0700 (PDT)
Subject: Better DES challenge update
Message-ID: <199706272201.SAA25446@crypto.com>
MIME-Version: 1.0
Content-Type: text/plain


------- Blind-Carbon-Copy

To: challenge@crypto.com
Subject: Better DES challenge update
Date: Fri, 27 Jun 1997 18:01:53 -0400
From: Matt Blaze <mab@tpc.crypto.com>

The prize for solving the ``better DES challenge'' has grown to almost
$500 and continues to rise daily.  Here's the list of prize pledges I have
as of June 27; the current pot stands at 3984 bits (US $498.00).  I hope
to have a web page up sometime next week (on www.crypto.com) with the
latest challenge status.  (This will be the last update via email, unless
someone solves the challenge or pledges some huge prize or some such).

DATE	Name			Email				Bits Pledged
============================================================================
6/22/97	Matt Blaze		mab@crypto.com			56 bits
6/23	AT&T Labs (via mab)	mab@research.att.com		56
6/24	Steve Gibbons		steve@wyrm.AZTech.Net		56
6/24	Bill Stewart		stewarts@ix.netcom.com		112
6/24	Peter Trei		trei@process.com		288
6/24	Jim Thompson		jim@hosaka.SmallWorks.COM	512
6/25	Adam Shostack		adam@homeport.org		512
6/25	Eric Blossom		eb@comsec.com			1024
6/26	Jamie Lawrence		jal@acm.org			56
6/26	Bill Frantz 		frantz@netcom.com		512
6/27	Jon Leonard		jleonard@divcom.umop-ap.com	800
								=========
GRAND TOTAL (Bits)						3984
GRAND TOTAL (USD)						$498.00

Tell your friends!  Note that the pot seems to be growing roughly
exponentially.  If this keeps up, I may join the search myself...

[Unfortunately, due to singularly inexcusable incompetence on the part
of my soon-to-be-former ISP (PSINet), mail to me was bouncing last week
so I may have missed some of the ``Better DES Challenge'' pledge mail.
If you pledged a prize and aren't on the list above, please resend.]

Official rules attached below for reference.

- -matt

N.B.  The ``bit'' is an archaic unit of currency equal to 1/8 of a US
dollar (hence, ``pieces of eight,'' ``two bits,'', etc.).  It seems an
appropriate measure for prizes in key-cracking contests.

============================

From: Matt Blaze <mab@research.att.com>
Subject: A better DES challenge
Date: Mon, 23 Jun 1997 16:04:25 -0400

I'm not a big fan of these ``challenges'' in which a prize is awarded
to the first person who discovers the key that produces some
plaintext/ciphertext pair.  The effort required to produce a solution
tends to grossly overstate the actual difficulty of searching the
keyspace, since invariably the winner uses the idle time on
general-purpose computers, which are poorly-optimized for use as
keysearch engines.

Another problem with challenges is that even when they are broken
they don't really provide convincing proof that the keyspace was
actually searched.  For example, in the recent 56-bit RSA DES
challenge, RSA has no way to prove that it didn't ``leak'' some hint
about the solution to the winner. (I hasten to point out that I'm not
suggesting that anything like this actually happened, only that a
skeptic might raise the possibility, against which RSA has no real way
to defend itself).  A better challenge, then, would be one in which
even the challenger doesn't know the solution in advance (or would
have had to itself search the keyspace or otherwise cryptanalyze the
cipher in order to find it).  For example, a challenge for a one-way
collision-intractable hash function could simply ask for an example of
a collision, or could ask for the inversion of some well-structured
output (such as all zeros).

We can do the same thing for encryption functions.  I propose an
alternative DES challenge that can be solved only by searching a large
fraction of the keyspace or by cryptanalyzing the cipher.  The
structure of the challenge is such that most people would agree that
either I don't know the solution myself or that I've already searched
the keyspace or otherwise cryptanalyzed DES in some way.  In other
words, the only way I could covertly ``help'' the challenge winner is
if I've already done what the challenge is supposed to establish is
possible in the first place.

Recall that there are 2^56 DES keys that each select a different
permutation of the 2^64 codebook entries.  We expect that there's
about a 1/2^8 chance that there exists a DES key that converts any
given plaintext block to any given ciphertext block.

My challenge is to find a key such that a ciphertext block of the form
<XXXXXXXX> decrypts to a plaintext block of the form <YYYYYYYY>, where
X and Y represent any fixed eight-bit byte value repeated across each
of the eight bytes of the block.

Observe that I'm actually posing 2^16 different challenge
plaintext/ciphertext pairs, each with about 1/2^8 probability of
having a solution, where groups of 2^8 challenges can be searched for
simultaneously.  Each challenge may have no solution key, exactly one
solution key, or more than one solution key, but it is very likely
that there is at least one solution key to at least one of them (in
fact, one could expect to find about 2^8 solutions overall, assuming
DES produces good pseudorandom permutations).

The most obvious way to find a solution is try, for each
properly-formed ciphertext block, every key in the DES keyspace until
a plaintext block of the proper form is found.  Special-purpose
hardware, based on FPGAs or ASICs, would obviously be helpful for this
purpose.  (One might first consider the eight weak / semi-weak DES
keys that have 2^32 fixed points, on the chance that one of the blocks
of this form is a fixed point for one of them.  Unfortunately however,
none are.)

I will award a grand prize of fifty six bits ($7 US dollars) to the first
person to provide a solution key.  (The challenge ends when first key
is found).  While the prize money is admittedly trivial (this is out
of my own pocket, after all), I hope it will serve as ``seed money''
that encourages others to add their own prizes to a growing pot.

Of course, I cannot be completely sure whether there exist any
solutions at all.  In the (unlikely) event that there is no winner by
August 1, 1999, I will award the 56 bit prize to the person who submits
the key that produces the most ``interesting'' plaintext block from
the all-zero ciphertext block.  I will be the final judge of what
constitutes interesting.  This prize will be announced at the rump
session of CRYPTO'99.

Void where prohibited by law, etc.  Comments, questions and solutions
should be submitted by email, to <challenge@crypto.com>.  If others wish
to pledge additional prizes, please also let me know at that address
and I'll keep track of who is offering what, etc..

- -matt

------- End of Blind-Carbon-Copy





Thread