fbpx
Wikipedia

EFF DES cracker

In cryptography, the EFF DES cracker (nicknamed "Deep Crack") is a machine built by the Electronic Frontier Foundation (EFF) in 1998, to perform a brute force search of the Data Encryption Standard (DES) cipher's key space – that is, to decrypt an encrypted message by trying every possible key. The aim in doing this was to prove that the key size of DES was not sufficient to be secure.

The EFF's US$250,000 DES cracking machine contained 1,856 custom chips and could brute force a DES key in a matter of days — the photo shows a two-sided DES Cracker circuit board fitted with 64 Deep Crack chips
The EFF's DES cracker "Deep Crack" custom microchip

Detailed technical data of this machine, including block diagrams, circuit schematics, VHDL source code of the custom chips and its emulator, have all been published in the book Cracking DES. Its public domain license allows everyone to freely copy, use, or modify its design. To avoid the export regulation on cryptography by the US Government, the source code was distributed not in electronic form but as a hardcopy book, of which the open publication is protected by the First Amendment. Machine-readable metadata is provided to facilitate the transcription of the code into a computer via OCR by readers.[1]

Background edit

DES uses a 56-bit key, meaning that there are 256 possible keys under which a message can be encrypted. This is exactly 72,057,594,037,927,936, or approximately 72 quadrillion possible keys. One of the major criticisms of DES, when proposed in 1975, was that the key size was too short. Martin Hellman and Whitfield Diffie of Stanford University estimated that a machine fast enough to test that many keys in a day would have cost about $20 million in 1976, an affordable sum to national intelligence agencies such as the US National Security Agency.[2] Subsequent advances in the price/performance of chips kept reducing that cost until, twenty years later, it became affordable for even a small nonprofit organization such as the EFF to mount a realistic attack.[3]

The DES challenges edit

DES was a federal standard, and the US government encouraged the use of DES for all non-classified data. RSA Security wished to demonstrate that DES's key length was not enough to ensure security, so they set up the DES Challenges in 1997, offering a monetary prize. The first DES Challenge was solved in 96 days by the DESCHALL Project led by Rocke Verser in Loveland, Colorado. RSA Security set up DES Challenge II-1, which was solved by distributed.net in 39 days in January and February 1998.[4]

In 1998, the EFF built Deep Crack (named in reference to IBM's Deep Blue chess computer) for less than $250,000.[5] In response to DES Challenge II-2, on July 15, 1998, Deep Crack decrypted a DES-encrypted message after only 56 hours of work, winning $10,000. The brute force attack showed that cracking DES was actually a very practical proposition. Most governments and large corporations could reasonably build a machine like Deep Crack.

Six months later, in response to RSA Security's DES Challenge III, and in collaboration with distributed.net, the EFF used Deep Crack to decrypt another DES-encrypted message, winning another $10,000. This time, the operation took less than a day – 22 hours and 15 minutes. The decryption was completed on January 19, 1999. In October of that year, DES was reaffirmed as a federal standard, but this time the standard recommended Triple DES.

The small key space of DES and relatively high computational costs of Triple DES resulted in its replacement by AES as a Federal standard, effective May 26, 2002.

Technology edit

Deep Crack was designed by Cryptography Research, Inc., Advanced Wireless Technologies, and the EFF. The principal designer was Paul Kocher, president of Cryptography Research. Advanced Wireless Technologies built 1,856 custom ASIC DES chips (called Deep Crack or AWT-4500), housed on 29 circuit boards of 64 chips each. The boards were then fitted in six cabinets and mounted in a Sun-4/470 chassis.[6]

 
Paul Kocher of Cryptography Research posing in front of Deep Crack

The search was coordinated by a single PC which assigned ranges of keys to the chips. The entire machine was capable of testing over 90 billion keys per second. It would take about 9 days to test every possible key at that rate. On average, the correct key would be found in half that time.

In 2006, another custom hardware attack machine was designed based on FPGAs. COPACOBANA (COst-optimized PArallel COdeBreaker) is able to crack DES at considerably lower cost.[7] This advantage is mainly due to progress in integrated circuit technology.

In July 2012, security researchers David Hulton and Moxie Marlinspike unveiled a cloud computing tool for breaking the MS-CHAPv2 protocol by recovering the protocol's DES encryption keys by brute force. This tool effectively allows members of the general public to recover a DES key from a known plaintext–ciphertext pair in about 24 hours.[8]

References edit

  1. ^ Electronic Frontier Foundation (1998). . Oreilly & Associates Inc. ISBN 1-56592-520-3. Archived from the original on October 17, 2013. Retrieved October 30, 2016.
  2. ^ "DES (Data Encryption Standard) Review at Stanford University – Recording and Transcript". 1976. from the original on February 28, 2022. Retrieved June 26, 2022.
  3. ^ . EFF.org. Archived from the original on June 22, 2013. Retrieved October 9, 2013.
  4. ^ David C. McNett (February 24, 1998). "The secret message is..." distributed.net. from the original on March 4, 2016. Retrieved February 27, 2014.
  5. ^ . EFF. Archived from the original on May 7, 2017. Retrieved July 8, 2007. On Wednesday, July 17, 1998 the EFF DES Cracker, which was built for less than $250,000, easily won RSA Laboratory's "DES Challenge II" contest and a $10,000 cash prize.
  6. ^ Electronic Frontier Foundation (1998). Cracking DES – Secrets of Encryption Research, Wiretap Politics & Chip Design. Oreilly & Associates Inc. ISBN 1-56592-520-3.
  7. ^ "COPACOBANA – Special-Purpose Hardware for Code-Breaking". www.sciengines.com. from the original on July 24, 2016. Retrieved April 26, 2018.
  8. ^ . CloudCracker.com. July 29, 2012. Archived from the original on March 16, 2016. Retrieved March 16, 2016.

External links edit

cracker, cryptography, nicknamed, deep, crack, machine, built, electronic, frontier, foundation, 1998, perform, brute, force, search, data, encryption, standard, cipher, space, that, decrypt, encrypted, message, trying, every, possible, doing, this, prove, tha. In cryptography the EFF DES cracker nicknamed Deep Crack is a machine built by the Electronic Frontier Foundation EFF in 1998 to perform a brute force search of the Data Encryption Standard DES cipher s key space that is to decrypt an encrypted message by trying every possible key The aim in doing this was to prove that the key size of DES was not sufficient to be secure The EFF s US 250 000 DES cracking machine contained 1 856 custom chips and could brute force a DES key in a matter of days the photo shows a two sided DES Cracker circuit board fitted with 64 Deep Crack chips The EFF s DES cracker Deep Crack custom microchip Detailed technical data of this machine including block diagrams circuit schematics VHDL source code of the custom chips and its emulator have all been published in the book Cracking DES Its public domain license allows everyone to freely copy use or modify its design To avoid the export regulation on cryptography by the US Government the source code was distributed not in electronic form but as a hardcopy book of which the open publication is protected by the First Amendment Machine readable metadata is provided to facilitate the transcription of the code into a computer via OCR by readers 1 Contents 1 Background 2 The DES challenges 3 Technology 4 References 5 External linksBackground editDES uses a 56 bit key meaning that there are 256 possible keys under which a message can be encrypted This is exactly 72 057 594 037 927 936 or approximately 72 quadrillion possible keys One of the major criticisms of DES when proposed in 1975 was that the key size was too short Martin Hellman and Whitfield Diffie of Stanford University estimated that a machine fast enough to test that many keys in a day would have cost about 20 million in 1976 an affordable sum to national intelligence agencies such as the US National Security Agency 2 Subsequent advances in the price performance of chips kept reducing that cost until twenty years later it became affordable for even a small nonprofit organization such as the EFF to mount a realistic attack 3 The DES challenges editDES was a federal standard and the US government encouraged the use of DES for all non classified data RSA Security wished to demonstrate that DES s key length was not enough to ensure security so they set up the DES Challenges in 1997 offering a monetary prize The first DES Challenge was solved in 96 days by the DESCHALL Project led by Rocke Verser in Loveland Colorado RSA Security set up DES Challenge II 1 which was solved by distributed net in 39 days in January and February 1998 4 In 1998 the EFF built Deep Crack named in reference to IBM s Deep Blue chess computer for less than 250 000 5 In response to DES Challenge II 2 on July 15 1998 Deep Crack decrypted a DES encrypted message after only 56 hours of work winning 10 000 The brute force attack showed that cracking DES was actually a very practical proposition Most governments and large corporations could reasonably build a machine like Deep Crack Six months later in response to RSA Security s DES Challenge III and in collaboration with distributed net the EFF used Deep Crack to decrypt another DES encrypted message winning another 10 000 This time the operation took less than a day 22 hours and 15 minutes The decryption was completed on January 19 1999 In October of that year DES was reaffirmed as a federal standard but this time the standard recommended Triple DES The small key space of DES and relatively high computational costs of Triple DES resulted in its replacement by AES as a Federal standard effective May 26 2002 Technology editDeep Crack was designed by Cryptography Research Inc Advanced Wireless Technologies and the EFF The principal designer was Paul Kocher president of Cryptography Research Advanced Wireless Technologies built 1 856 custom ASIC DES chips called Deep Crack or AWT 4500 housed on 29 circuit boards of 64 chips each The boards were then fitted in six cabinets and mounted in a Sun 4 470 chassis 6 nbsp Paul Kocher of Cryptography Research posing in front of Deep Crack The search was coordinated by a single PC which assigned ranges of keys to the chips The entire machine was capable of testing over 90 billion keys per second It would take about 9 days to test every possible key at that rate On average the correct key would be found in half that time In 2006 another custom hardware attack machine was designed based on FPGAs COPACOBANA COst optimized PArallel COdeBreaker is able to crack DES at considerably lower cost 7 This advantage is mainly due to progress in integrated circuit technology In July 2012 security researchers David Hulton and Moxie Marlinspike unveiled a cloud computing tool for breaking the MS CHAPv2 protocol by recovering the protocol s DES encryption keys by brute force This tool effectively allows members of the general public to recover a DES key from a known plaintext ciphertext pair in about 24 hours 8 References edit Electronic Frontier Foundation 1998 Cracking DES Secrets of Encryption Research Wiretap Politics amp Chip Design Oreilly amp Associates Inc ISBN 1 56592 520 3 Archived from the original on October 17 2013 Retrieved October 30 2016 DES Data Encryption Standard Review at Stanford University Recording and Transcript 1976 Archived from the original on February 28 2022 Retrieved June 26 2022 DES Cracker Project EFF org Archived from the original on June 22 2013 Retrieved October 9 2013 David C McNett February 24 1998 The secret message is distributed net Archived from the original on March 4 2016 Retrieved February 27 2014 DES Cracker Project EFF Archived from the original on May 7 2017 Retrieved July 8 2007 On Wednesday July 17 1998 the EFF DES Cracker which was built for less than 250 000 easily won RSA Laboratory s DES Challenge II contest and a 10 000 cash prize Electronic Frontier Foundation 1998 Cracking DES Secrets of Encryption Research Wiretap Politics amp Chip Design Oreilly amp Associates Inc ISBN 1 56592 520 3 COPACOBANA Special Purpose Hardware for Code Breaking www sciengines com Archived from the original on July 24 2016 Retrieved April 26 2018 Divide and Conquer Cracking MS CHAPv2 with a 100 success rate CloudCracker com July 29 2012 Archived from the original on March 16 2016 Retrieved March 16 2016 External links edit nbsp Wikimedia Commons has media related to EFF DES cracker The DES Cracker at the Electronic Frontier Foundation Photos of the machine at Cryptography Research A FPGA implementation using 48 Virtex 6 LX240Ts ASIC design from 1994 that could crack DES in 24 hours with 256 custom chips Retrieved from https en wikipedia org w index php title EFF DES cracker amp oldid 1142041366, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.