fbpx
Wikipedia

Custom hardware attack

In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.

The EFF's "Deep Crack" machine contained 1,856 custom chips and could brute force a DES key in a matter of days — the photo shows a circuit board fitted with 32 custom attack chips

Mounting a cryptographic brute force attack requires a large number of similar computations: typically trying one key, checking if the resulting decryption gives a meaningful answer, and then trying the next key if it does not. Computers can perform these calculations at a rate of millions per second, and thousands of computers can be harnessed together in a distributed computing network. But the number of computations required on average grows exponentially with the size of the key, and for many problems standard computers are not fast enough. On the other hand, many cryptographic algorithms lend themselves to fast implementation in hardware, i.e. networks of logic circuits, also known as gates. Integrated circuits (ICs) are constructed of these gates and often can execute cryptographic algorithms hundreds of times faster than a general purpose computer.[1]

Each IC can contain large numbers of gates (hundreds of millions in 2005). Thus, the same decryption circuit, or cell, can be replicated thousands of times on one IC. The communications requirements for these ICs are very simple. Each must be initially loaded with a starting point in the key space and, in some situations, with a comparison test value (see known plaintext attack). Output consists of a signal that the IC has found an answer and the successful key.

Since ICs lend themselves to mass production, thousands or even millions of ICs can be applied to a single problem. The ICs themselves can be mounted in printed circuit boards. A standard board design can be used for different problems since the communication requirements for the chips are the same. Wafer-scale integration is another possibility. The primary limitations on this method are the cost of chip design, IC fabrication, floor space, electric power and thermal dissipation.[2]

History edit

The earliest custom hardware attack may have been the Bombe used to recover Enigma machine keys in World War II. In 1998, a custom hardware attack was mounted against the Data Encryption Standard cipher by the Electronic Frontier Foundation. Their "Deep Crack" machine cost U.S. $250,000 to build and decrypted the DES Challenge II-2 test message after 56 hours of work. The only other confirmed DES cracker was the COPACOBANA machine (Cost-Optimized PArallel COde Breaker) built in 2006. Unlike Deep Crack, COPACOBANA consists of commercially available FPGAs (reconfigurable logic gates). COPACOBANA costs about $10,000[3] to build and will recover a DES key in under 6.4 days on average. The cost decrease by roughly a factor of 25 over the EFF machine is an impressive example of the continuous improvement of digital hardware. Adjusting for inflation over 8 years yields an even higher improvement of about 30x. Since 2007, SciEngines GmbH, a spin-off company of the two project partners of COPACOBANA has enhanced and developed successors of COPACOBANA. In 2008, their COPACOBANA RIVYERA reduced the time to break DES to the current record of less than one day, using 128 Spartan-3 5000's.[4] It is generally believed[citation needed] that large government code breaking organizations, such as the U.S. National Security Agency, make extensive use of custom hardware attacks, but no examples have been declassified as of 2005.

See also edit

References edit

  1. ^ Jindal, Poonam; Abou Houran, Mohamad; Goyal, Deepam; Choudhary, Anurag (2023-06-01). "A review of different techniques used to design photonic crystal-based logic gates". Optik. 280: 170794. Bibcode:2023Optik.280q0794J. doi:10.1016/j.ijleo.2023.170794. ISSN 0030-4026. S2CID 257725561.
  2. ^ Navaraj, William Taube; Gupta, Shoubhik; Lorenzelli, Leandro; Dahiya, Ravinder (April 2018). "Wafer Scale Transfer of Ultrathin Silicon Chips on Flexible Substrates for High Performance Bendable Systems". Advanced Electronic Materials. 4 (4): 1700277. doi:10.1002/aelm.201700277. S2CID 85547788.
  3. ^ Gerd Pfeiffer; Christof Paar; Jan Pelzl; Sandeep Kumar; Andy Rupp; Manfred Schimmler. How to Break DES for EUR 8,980 (PDF). SHARCS 2006.
  4. ^ Break DES in less than a single day 2011-07-16 at the Wayback Machine [Press release of firm, demonstrated at a 2009 workshop]

External links edit

  • COPACOBANA, Cost Optimized Code Breaker and Analyzer
  • FPGA-based Oracle RDBMS passwords cracker

custom, hardware, attack, this, article, multiple, issues, please, help, improve, discuss, these, issues, talk, page, learn, when, remove, these, template, messages, this, article, needs, additional, citations, verification, please, help, improve, this, articl. This article has multiple issues Please help improve it or discuss these issues on the talk page Learn how and when to remove these template messages This article needs additional citations for verification Please help improve this article by adding citations to reliable sources Unsourced material may be challenged and removed Find sources Custom hardware attack news newspapers books scholar JSTOR March 2009 Learn how and when to remove this template message This article may need to be rewritten to comply with Wikipedia s quality standards You can help The talk page may contain suggestions July 2023 This article possibly contains original research Please improve it by verifying the claims made and adding inline citations Statements consisting only of original research should be removed July 2023 Learn how and when to remove this template message Some of this article s listed sources may not be reliable Please help this article by looking for better more reliable sources Unreliable citations may be challenged or deleted July 2023 Learn how and when to remove this template message Learn how and when to remove this template message In cryptography a custom hardware attack uses specifically designed application specific integrated circuits ASIC to decipher encrypted messages The EFF s Deep Crack machine contained 1 856 custom chips and could brute force a DES key in a matter of days the photo shows a circuit board fitted with 32 custom attack chipsMounting a cryptographic brute force attack requires a large number of similar computations typically trying one key checking if the resulting decryption gives a meaningful answer and then trying the next key if it does not Computers can perform these calculations at a rate of millions per second and thousands of computers can be harnessed together in a distributed computing network But the number of computations required on average grows exponentially with the size of the key and for many problems standard computers are not fast enough On the other hand many cryptographic algorithms lend themselves to fast implementation in hardware i e networks of logic circuits also known as gates Integrated circuits ICs are constructed of these gates and often can execute cryptographic algorithms hundreds of times faster than a general purpose computer 1 Each IC can contain large numbers of gates hundreds of millions in 2005 Thus the same decryption circuit or cell can be replicated thousands of times on one IC The communications requirements for these ICs are very simple Each must be initially loaded with a starting point in the key space and in some situations with a comparison test value see known plaintext attack Output consists of a signal that the IC has found an answer and the successful key Since ICs lend themselves to mass production thousands or even millions of ICs can be applied to a single problem The ICs themselves can be mounted in printed circuit boards A standard board design can be used for different problems since the communication requirements for the chips are the same Wafer scale integration is another possibility The primary limitations on this method are the cost of chip design IC fabrication floor space electric power and thermal dissipation 2 Contents 1 History 2 See also 3 References 4 External linksHistory editThe earliest custom hardware attack may have been the Bombe used to recover Enigma machine keys in World War II In 1998 a custom hardware attack was mounted against the Data Encryption Standard cipher by the Electronic Frontier Foundation Their Deep Crack machine cost U S 250 000 to build and decrypted the DES Challenge II 2 test message after 56 hours of work The only other confirmed DES cracker was the COPACOBANA machine Cost Optimized PArallel COde Breaker built in 2006 Unlike Deep Crack COPACOBANA consists of commercially available FPGAs reconfigurable logic gates COPACOBANA costs about 10 000 3 to build and will recover a DES key in under 6 4 days on average The cost decrease by roughly a factor of 25 over the EFF machine is an impressive example of the continuous improvement of digital hardware Adjusting for inflation over 8 years yields an even higher improvement of about 30x Since 2007 SciEngines GmbH a spin off company of the two project partners of COPACOBANA has enhanced and developed successors of COPACOBANA In 2008 their COPACOBANA RIVYERA reduced the time to break DES to the current record of less than one day using 128 Spartan 3 5000 s 4 It is generally believed citation needed that large government code breaking organizations such as the U S National Security Agency make extensive use of custom hardware attacks but no examples have been declassified as of 2005 update See also editTWIRL TWINKLEReferences edit Jindal Poonam Abou Houran Mohamad Goyal Deepam Choudhary Anurag 2023 06 01 A review of different techniques used to design photonic crystal based logic gates Optik 280 170794 Bibcode 2023Optik 280q0794J doi 10 1016 j ijleo 2023 170794 ISSN 0030 4026 S2CID 257725561 Navaraj William Taube Gupta Shoubhik Lorenzelli Leandro Dahiya Ravinder April 2018 Wafer Scale Transfer of Ultrathin Silicon Chips on Flexible Substrates for High Performance Bendable Systems Advanced Electronic Materials 4 4 1700277 doi 10 1002 aelm 201700277 S2CID 85547788 Gerd Pfeiffer Christof Paar Jan Pelzl Sandeep Kumar Andy Rupp Manfred Schimmler How to Break DES for EUR 8 980 PDF SHARCS 2006 Break DES in less than a single day Archived 2011 07 16 at the Wayback Machine Press release of firm demonstrated at a 2009 workshop External links editCOPACOBANA Cost Optimized Code Breaker and Analyzer FPGA based Oracle RDBMS passwords cracker Retrieved from https en wikipedia org w index php title Custom hardware attack amp oldid 1186058477, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.