Bugtraq mailing list archives
[Fwd: DESCHALL Press Release]
From: byoung () ORU EDU (Brian Young)
Date: Wed, 18 Jun 1997 15:49:14 -0500
This is a multi-part message in MIME format.
--------------A0CBE48A342A7D8F92DCF804
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
--
byoung () oru edu
Brian Young
Internet Systems Admin
Oral Roberts University
--------------A0CBE48A342A7D8F92DCF804
Content-Type: message/rfc822
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Received: from gatekeeper.megasoft.com (gatekeeper.megasoft.com [206.98.200.180]) by lib.oru.edu (8.8.6/8.8.5) with
ESMTP id PAA13186 for <byoung () oru edu>; Wed, 18 Jun 1997 15:35:44 -0500 (CDT)
Received-Date: Wed, 18 Jun 1997 15:35:44 -0500 (CDT)
Received: (from majordom@localhost) by gatekeeper.megasoft.com (8.7.5/8.7.3) id QAA17171 for deschall-outgoing; Wed, 18
Jun 1997 16:00:26 -0400 (EDT)
Received: (from uucp@localhost) by gatekeeper.megasoft.com (8.7.5/8.7.3) id QAA17166 for <deschall () gatekeeper
megasoft com>; Wed, 18 Jun 1997 16:00:25 -0400 (EDT)
Received: from dopey.verser.frii.com(206.168.13.68) by gatekeeper.megasoft.com via smap (V2.0)
id xma017164; Wed, 18 Jun 97 16:00:19 -0400
Received: (from rcv@localhost) by dopey.verser.frii.com (8.6.12/8.6.12) id OAA06697 for deschall () gatekeeper megasoft
com; Wed, 18 Jun 1997 14:09:11 -0600
Date: Wed, 18 Jun 1997 14:09:11 -0600
From: Rocke Verser <rcv () dopey verser frii com>
Message-Id: <199706182009.OAA06697 () dopey verser frii com>
To: deschall () gatekeeper megasoft com
Subject: DESCHALL Press Release
Sender: owner-deschall () gatekeeper megasoft com
Precedence: bulk
INTERNET-LINKED COMPUTERS CHALLENGE DATA ENCRYPTION STANDARD
LOVELAND, COLORADO (June 18, 1997). Tens of thousands of
computers, all across the U.S. and Canada, linked together via the
Internet in an unprecedented cooperative supercomputing effort to
decrypt a message encoded with the government-endorsed Data Encryption
Standard (DES).
Responding to a challenge, including a prize of $10,000, offered by
RSA Data Security, Inc, the DESCHALL effort successfully decoded
RSADSI's secret message.
According to Rocke Verser, a contract programmer and consultant who
developed the specialized software in his spare time, "Tens of thousands
of computers worked cooperatively on the challenge in what is believed
to be one of the largest supercomputing efforts ever undertaken outside
of government."
Using a technique called "brute-force", computers participating in
the challenge simply began trying every possible decryption key. There
are over 72 quadrillion keys (72,057,594,037,927,936). At the time the
winning key was reported to RSADSI, the DESCHALL effort had searched
almost 25% of the total. At its peak over the recent weekend, the
DESCHALL effort was testing 7 billion keys per second.
Verser considers this project to be remarkable in two ways:
One. This is the first time anyone has publicly shown that they
can read a message encrypted with DES. And this was done with "spare"
CPU time, mostly from ordinary PCs, by thousands of users who have never
even met each other. U.S. government and industry will have to take a
hard look at their cryptographic policies. "DES can no longer be
considered secure against a determined adversary", Verser said.
Two. This project demonstrates the kind of supercomputing power
that can be harnessed on the Internet using nothing but "spare" CPU
time. "Imagine what might be possible using millions of computers
connected to the Internet!" Aside from cryptography and other obvious
mathematical uses, supercomputers are used in many fields of science.
"Perhaps a cure for cancer is lurking on the Internet?", said Verser,
"Or perhaps the Internet will become Everyman's supercomputer."
Under current U.S. government export regulations, and underscoring
a problem faced by the U.S. software industry, the program that searched
the keys could not be exported, except to Canada. A competitive effort,
based in Sweden, sprang up well after the DESCHALL effort began. Able
to "market" their keysearch software around the world, the Swedish
effort caught up quickly, and had searched nearly 10 quadrillion keys by
the end of the contest.
------------------------------------
Verser agrees with the sentiment voiced in RSADSI's secret message:
"Strong cryptography makes the world a safer place."
Use of strong cryptography, both domestically and internationally,
is essential in today's electronic world. "But not at the expense of a
citizen's right to privacy." Verser adds, "Recent proposals for
'key-recovery' and for criminalization of the use of cryptography have no
place in a free society."
Information about the DESCHALL effort is available from the
official DESCHALL Web site at: <http://www.frii.com/~rcv/deschall.htm>
MEDIA CONTACTS:
Matt Curtin, (908) 431-5300 x 295, <cmcurtin () research megasoft com>
ALTERNATE:
Rocke Verser, (970) 663-5629, <rcv () dopey verser frii com>
ALTERNATE:
Justin Dolske, (614) 459-5194, <dolske.1 () osu edu>
- 30 -
INTERNET LINKED COMPUTERS CHALLENGE DATA ENCRYPTION STANDARD
Background / Sidebar, for Release dated June 18, 1997
The Data Encryption Standard, DES, is a national standard, adopted
in 1977. Use of DES is mandatory in most Federal agencies, except the
military. DES is very widely used in the private sector, as well.
Interbank wire transfers, Visa transactions, your medical and
financial records, and your employer's financial data are some of the
many things secured against prying eyes or against modification by DES.
When the Data Encryption Standard was adopted in 1977, there was
some question as to whether or not the Standard was adequate to protect
confidential data.
Matt Curtin, Chief Scientist for Megasoft, Inc. says, "This is
proving by example, not by mathematical calculation, that DES can be
broken with little or no cost." Curtin added, "Others could just as
easily be attempting to gain access to multibillion dollar wire
transfers."
MEDIA CONTACTS:
Matt Curtin, (908) 431-5300 x 295, <cmcurtin () research megasoft com>
ALTERNATE:
Rocke Verser, (970) 663-5629, <rcv () dopey verser frii com>
ALTERNATE:
Justin Dolske, (614) 459-5194, <dolske.1 () osu edu>
- 30 -
INTERNET LINKED COMPUTERS CHALLENGE DATA ENCRYPTION STANDARD
Background for Release dated June 18, 1997
DESCHALL DATA SHEET
DESCHALL Web site:
<http://www.frii.com/~rcv/deschall.htm>
Principal Organizer:
Rocke Verser, self-employed contract programmer, Loveland, Colorado
Team Leaders - Did "everything" Rocke didn't have time to do
Matt Curtin, Chief Scientist, Megasoft Online
Justin Dolske, Graduate Fellow / Research Associate, Ohio State Universtiy
Team Contributors:
Guy Albertelli, several "ports"
Kelly Campbell, original Mac port
Darrell Kindred, blazing fast bitslice clients
Andrew Meggs, blazing fast Mac client
Karl Runge, statistics and rankings
Team Members:
Dozens of people who contributed "shareware".
Thousands of ordinary folks, who contributed "spare" CPU cycles.
Project statistics:
Start of contest: January 29, 1997
Announcement of DESCHALL project: February 18, 1997
End of contest: June 17, 1997
Size of keyspace: 72,057,594,037,927,936
Keys searched: 17,731,502,968,143,872
Peak keys/day: 601,296,394,518,528
Peak keys/second: 7,000,000,000 (approx)
Peak clients/day: 14,000 (approx, based on IP address)
Total clients, since start: 78,000 (approx, based on IP address)
The computer that found the key:
CPU: Pentium 90
RAM: 16 megabytes
Operating System: FreeBSD 2.2.1
Speed (keys/second): 250,000 (approx)
Client: FreeBSD v0.214, built March 12, 1997
Owner: iNetZ Corporation, Salt Lake City, Utah
Operator: Michael K. Sanders
MEDIA CONTACTS:
Matt Curtin, (908) 431-5300 x 295, <cmcurtin () research megasoft com>
ALTERNATE:
Rocke Verser, (970) 663-5629, <rcv () dopey verser frii com>
ALTERNATE:
Justin Dolske, (614) 459-5194, <dolske.1 () osu edu>
--------------A0CBE48A342A7D8F92DCF804--
Current thread:
- Re: Netscape Exploit SOLVED Paul T. Kooros (Jun 16)
- Re: Netscape Exploit SOLVED Yusuf Motiwala (Jun 18)
- Netscape Communicator 4.01 Aleph One (Jun 18)
- [Fwd: DESCHALL Press Release] Brian Young (Jun 18)
- <Possible follow-ups>
- Re: Netscape Exploit SOLVED Edwin Li-Kai Liu (Jun 19)
- Re: Netscape Exploit SOLVED John Robert LoVerso (Jun 20)
- Re: Netscape Exploit SOLVED Aymeric Grassart (Jun 20)
- Re: Netscape exploit solved Paul T. Kooros (Jun 23)
