CDR: Codebreaking with a multi-Teraflops network: one technique

Ray Dillinger bear at sonic.net
Tue Nov 7 16:01:47 PST 2000


Let's say you're a high-level spook, and you've got a bunch of 
encrypted intercepts of uncertain origin.  Gigabytes and gigabytes 
of them. Maybe they came with partial keys, maybe they are only 
40-bit or 56-bit keyed in the first place.  Maybe you have partial 
keys on some of them (from the "work reduction fields" or whatever 
on lotus notes for example).  You don't have any knowledge that 
would link a particular one of these with a particular case, but 
you strongly suspect that somewhere in there are a few dozen that 
bear on cases you're investigating, and maybe a few dozen more 
that would be good leads into cases you ought to investigate.

You'd like to focus a few dozen Teraflops of processing power on 
it, but most of your machines are taken up with higher-priority 
projects pertaining to identifiable cases, or to projects that 
have better odds of near-term success. What can you do?  

It should be childs play to set up a "front", as a scientific or 
charitable organization.  Dream up a CPU-intensive task that engages 
people's imagination or sense of wonder, but which nobody would 
expect results from anytime soon.  Write pages and pages about 
having written the kind of software you'd need to run to work on 
that problem -- the Great Idea, the problems, the triumphs and 
tribulations, the agonizing decisions and occasional design 
compromises and limitations, and the satisfaction with the end 
result.  All fiction, but hey, this is just a front, right? 

Now, take your code breaking software and add some pretty graphics 
to it.  Graphics and messages that have to do with the fake project 
you dreamed up.  Arrange it so it runs as a screensaver.  Set up a 
server that breaks the keyspaces and intercepts you need to check 
into chunks, and let people download chunks to work on and upload 
results.  Set up elaborate tracking stuff that tells how many CPU-
hours, how many work units, etc, each contributor has contributed.  

Hire a bunch of people at the front organization who sincerely 
believe that all these cycles are expended on the fake project, 
and let them effusively thank all the people who download and run 
the software.  Explain that you can't release the source, because 
then people would modify it and your scientific data might be 
corrupted.  

It could work.  

>From the outside, it would look a lot like the SetiAtHome project.

Just a thought.  

				Bear







More information about the cypherpunks-legacy mailing list