40-bit RC5 crack meaningless??

Anonymous nobody at REPLAY.COM
Fri Feb 7 07:19:01 PST 1997


Over on sci.crypt, Paul C. Kocker <pck at netcom.com> gave a clear and
confident response to a query about the statistical difference between a
brute force attack on a known Russian or English text, versus a similar
attack on cyphertext with a known-plaintext sample (Strassmann's tell-tale
Clue #3.)

Said Kocher:

The difference is negligable.  With English text encrypted under
a 64-bit block cipher, you know that the most significant
bit of each of the 8 bytes in the block should be zero.  For a
wrong key, there is a 255/256 probability that at least one of
these bits will be nonzero, allowing immediate rejection of
the key.  Keys which do produce all zero bits get tested on
additional blocks until the key is either deemed correct or
rejected.  The extra overhead per wrong key is the sum from
i=1 to infinity of i*(1/256^i), or under 0.4 percent.

In practice, the slowdown is actually a couple of percent, since
it complicates the skip-the-last-Fiestel-round optimization. Also,
the 1/256 case requires running extra code, which can fill the
microprocessor's cache with code which isn't part of
the main loop, slowing things down a bit when the computer
goes back to the main search.

Cheers,
Paul

____________________________________      http://www.cryptography.com
Paul Kocher (pck at netcom.com)       |     Voicemail: +1-(415)-354-8004
Crypto consultant                  |           FAX: +1-(415)-321-1483








More information about the cypherpunks-legacy mailing list