Crack DES in 3.5 hours for only $1,500,000!

Carl Ellison cme at ellisun.sw.stratus.com
Fri Sep 10 14:02:51 PDT 1993


>From: gnu at toad.com (John Gilmore)
>Message-Id: <9309100913.AA23487 at toad.com>
>Subject: Re: Crack DES in 3.5 hours for only $1,500,000! 
>Date: Fri, 10 Sep 93 02:13:32 -0700

It feels like you're jumping to conclusions, John.  At 40 bits of key, I
don't care how strong an algorithm is.  I can have my network of
SPARCstations try all keys.  NSA chip technology doesn't enter into that
analysis.

Meanwhile, on the death of DES -- what we know is that there's a known
plaintext attack, given the right hardware.

What I've recently heard called a pre-whitening (XOR with PRNG before the
DES) wipes out the known plaintext.  The PRNG doesn't need to be that
strong.  It's protected by DES and vice versa -- Chinese-puzzle style.

Of course, my personal favorite DES variant remains:

	compress|des|tran|des|tran|des

but if you're really paranoid, you could change it to:

	compress|xor|tran|des|tran|des|tran|des

since xor and tran are so cheap.  [des in any mode you prefer -- eg.,
cbc or cfb -- IVs kept secret, of course.]

[For those not reading sci.crypt, tran is an (up to) 8KB transposition
with PRNG keyed from the histogram of the first block of bytes -- code
posted to sci.crypt, mailed by me or avbl by ftp from scss3.cl.msu.edu.]

 - Carl






More information about the cypherpunks-legacy mailing list