FC: RSA Challenge attack on 64-bit RC5 key -- now 50 percent done

From: Declan McCullagh (declanat_private)
Date: Fri Jun 15 2001 - 08:35:29 PDT

  • Next message: Declan McCullagh: "FC: Jeff Rosen on Scalia, privacy, and Kyllo case, from WSJ"

    [RC5 is a block cipher invented by Ron Rivest; RSA owns the patent. --Declan]
    
    ********
    
    From: "Trei, Peter" <ptreiat_private>
    To: "'cypherpunksat_private'" <cypherpunksat_private>,
             "'declanat_private'"
    	<declanat_private>
    Subject: RC5-64 attack hits 50% point
    Date: Fri, 15 Jun 2001 11:25:52 -0400
    
    The only RSA Secret Key Challenge known to be under active attack
    at this time is RC5-64, by distributed.net. Last night this reached the
    50% mark, having tested  9,225,283,403,065,065,472  keys at the time I
    write this, over 1331 days. The current rate is over 210 Gkeys/sec - they
    should complete the keyspace in the next 18 months.
    
    See: http://stats.distributed.net/rc5-64/
    
    Way back in the previous millenium, RSA (then Security Dynamics)
    issued a series of 'secret key challenges', in which prizes were
    offered for decrypting messages encrypted wish RC5 and DES.
    
    http://www.rsasecurity.com/rsalabs/challenges/
    
    <brag-mode:on>
    I was responsible for getting SDTI to create the challenges, proposing
    them to Jim Bidzos to complement the long standing RSA factoring
    contests back in 1996. I was mainly interested in demonstrating that
    56 bit DES (then the strongest exportable algorithm) was inadequate,
    and had created a proof-of-principle DES key-cracker  to demonstrate
    that the goal was achievable.
    
    Jim thought this was a good idea, and I was soon collaborating with
    RSA Labs in the design of the challenges - long before I came to work
    at SDTI/RSA.
    
    The first challenge (40 bit RC5) fell in 3.5 hours, and was soon followed
    by others, leading up to the 3rd DES challenge in 1999, when
    distributed.net and the EFF combined to brute force a 56 bit DES
    key in 23 hours.
    
    The success in the attacks on the Secret Key Challenges created
    facts on the ground exposing the weakness of exportable crypto, and
    in my opinion were important in causing the relaxation of US export
    regulations in early 2000
    <brag-mode:off>.
    
    Peter Trei
    
    
    
    
    -------------------------------------------------------------------------
    POLITECH -- Declan McCullagh's politics and technology mailing list
    You may redistribute this message freely if you include this notice.
    To subscribe, visit http://www.politechbot.com/info/subscribe.html
    This message is archived at http://www.politechbot.com/
    -------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Fri Jun 15 2001 - 08:57:50 PDT