RE: des-cbc

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Mr. Harris:

	First off, I'll thank you to quote me in my entirety if you plan to do
that, otherwise don't quote me at all. You simply left off the pertinent
parts of my initial argument, then in the second paragraph you said just
what I said, that the key length was too short.

	I admit I don't understand the difference between "Inadequate key size is
the only known practical problem with DES", and the fact that I stated that
the key length "being short" is relative to the amount of time it takes to
use a brute force attack. Your own justification of 3DES articulates that it
is strong predicated on what you feel the processing power will be in 3
years!

	Perhaps your arguments about a 12GHz machines being fast enough are true,
but what if those 12GHz machines are worth $50 a pop by then, and someone
uses 500 of them at one time in a Linux cluster? The impact of a high
capacity machine does not mean that any person encouraged to break a key
family via brute force, will do so with a single machine!


Very Respectfully,

Stuart Blake Tener, IT3, USNR-R, N3GWG
Beverly Hills, California
VTU 1904G (Volunteer Training Unit)
stuart@xxxxxxxxxxx
west coast: (310)-358-0202 P.O. Box 16043, Beverly Hills, CA 90209-2043
east coast: (215)-338-6005 P.O. Box 45859, Philadelphia, PA 19149-5859

Telecopier: (419)-715-6073 fax to email gateway via www.efax.com (it's
free!)

JOIN THE US NAVY RESERVE, SERVE YOUR COUNTRY, AND BENEFIT FROM IT ALL.

Friday, October 05, 2001 11:30 PM

-----Original Message-----
From: owner-linux-crypto@xxxxxxxxxxxx
[mailto:owner-linux-crypto@xxxxxxxxxxxx]On Behalf Of Sandy Harris
Sent: Friday, October 05, 2001 5:59 PM
To: linux-crypto@xxxxxxxxxxxx
Subject: Re: des-cbc

"IT3 Stuart B. Tener, USNR-R" wrote:

> Crypto list members:
>
> The very honest to g-d truth is not that DES is weak due to a short key
length,

Nonsense. Inadequate key size is the only known practical problem with DES.
Differential and linear cryptanalysis both break it faster than brute force
in theory, but neither is a practical attack.

The DES keylength was arguably too short when it was designed. Diffie and
Hellman published a paper in 1977 showing that a keysearch machine that
would break DES in about 9 hours could be built for $20 million.

> or even broken (which is a lie, it has never been cracked).

Sure it has:
http://www.eff.org/descracker.html
http://www.distributed.net/pressroom/DESII-1-PR.html

The EFF machine was essentially the same design as Diffie and Hellman's,
cost $200-odd thousand, and broke DES in 57 hours.

> Its key
> length would not be considered short if we were all running 1MHz Z80s
again.
> Key length is a determining factor only when the technology of
effectuating
> a brute force attack in a short period of time has become a low cost
choice.
>
>         Everyone now is saying 3DES is strong, but will we consider it
strong in 3
> years? Even if the algorithm is never found to have been cracked? Of
course
> we will, by then we will all have 12GHz processors, and 3DES will seem the
> same joke that DES is now.

You don't appear to understand the math. For one explanation, see:
http://www.freeswan.org/freeswan_trees/freeswan-1.91/doc/glossary.html#brute

Going from 1 MHz to 12 GHz is a factor of 12,000. 14 extra key bits make
a cipher 2^14, about 16,000, times harder to brute force. At least against
brute force keysearch, 3DES is strong enough.

A meet-in-the-middle attack breaks 3DES in 2^112 encryptions, but that is
almost certainly large enough to be safe. Also, the attack requires some
absurd amount of memory.

Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux