Interesting People mailing list archives
IP: Swiss-based Ph.D. Student Solves 48-bit Key in RSA Data
From: David Farber <farber () cis upenn edu>
Date: Fri, 14 Feb 1997 11:59:49 -0500
(RSA-DATA-SECURITY)(SDTI) Swiss-based Ph.D. Student Solves 48-bit
Key in RSA Data Security's Secret-Key Challenge; Search rate by
3,500 computers reaches 1.5 trillion keys per hour
Business Editors & Computer Writers
REDWOOD CITY, Calif.--(BUSINESS WIRE)--Feb. 14, 1997--RSA Data
Security, Inc., a wholly-owned subsidiary of Security Dynamics
Technologies, Inc. (NASDAQ: SDTI), today announced that the 48-bit
encryption challenge, posted on RSA's World-Wide Web site on January
28, was solved February 10 by a cryptographer in Switzerland.
More than 3,500 host computers were linked over the Internet to
find the key, with a peak key search rate of 1.5 trillion keys per
hour.
As expected, the key search was solved after exhausting
approximately 57 percent of the total available key space, close to
the 50 percent statistical average.
RSA's Secret-Key Challenge is being offered to demonstrate the
modest level of security in the encryption technology currently
allowed to be exported under past and current U.S. government
policy. The 48-bit codebreaking effort was headed by Germano
Caronni, a student at the Swiss Federal Institute of Technology who
is working on a Ph.D. in communication security.
Caronni, using his own workstation and an extended client/server
program he wrote in 1992, solicited help via newsgroups and mailing
lists on the Internet. Starting with a group of 800 computers and
working up to 3,520 computers donating their idle time, the program
parceled out blocks of keys to test. Using a "brute force"
technique, the correct key was found after 312 hours of processing.
The winners will receive $5,000 from RSA for their effort, and the
funds will be donated to Project Gutenberg at
http://www.promo.net/pg/.
The solved message was encrypted with RSA's RC5 encryption
algorithm. Although the key for the particular message was found,
the algorithm itself remains valid, since a comparable effort would
be required to break any other similarly encrypted message.
However, RSA believes this event demonstrates the need for longer
keys.
"You don't want to use keys that are so short that anyone on the
Internet could simply harness the idle processing time of other
people's computers, with their cooperation, to reveal private and
personal information," said Jim Bidzos, president of RSA. "With the
Internet and today's desktop and workstation computers, it is
entirely reasonable to crack Data Encryption Standard
(DES)-encrypted and other 56-bit encrypted messages in such a short
time that it makes the algorithms very questionable for use in
commercial applications."
In fact, the same group that solved the 48-bit key is already
planning an assault on the 56-bit key, also part of RSA's contest.
"I am aware that the effort is much higher, but the computing power
we saw during the last two weeks is so strong that we imagine that
there could be enough power collected to solve 56-bit DES in several
months," Caronni said.
Currently, U.S. policy on cryptography allows export of only 40-
bit encryption technology with exceptions possible for 56-bit
algorithms. "We believe the policy should be uniform worldwide,"
Bidzos said. "In our opinion, 40-bit encryption is completely
unacceptable for commercial use and therefore, the government policy
is untenable. It is also our opinion that 56-bit DES, even though
it's much stronger than a 48-bit key length, is still not acceptable
because it is still practical for someone to crack open a message
using borrowed processing time. We aim to prove that in this
challenge."
The implication, Bidzos stated, is that baseline encryption for
commercial purposes needs to be raised to a much higher level. "We
at RSA believe that the standard for encryption key lengths should
be 128 bits, which is the currently-supported maximum key length for
RSA's RC4 and RC5 algorithms and other symmetric algorithms that RSA
provides," he said. Several scientific panels have recommended key
lengths no shorter than 90 bits as the minimum acceptable length to
assure long-term message security.
RSA Data Security, Inc.
RSA Data Security, Inc., a wholly-owned subsidiary of Security
Dynamics Technologies, Inc., is the world's brand name for
cryptography, with more than 80 million copies of RSA encryption and
authentication technologies installed and in use worldwide. RSA
technologies are part of existing and proposed standards for the
Internet and World-Wide Web, CCITT, ISO, ANSI, IEEE, and business,
financial and electronic commerce networks around the globe. The
company develops and markets platform-independent developer's kits
and end-user products and provides comprehensive cryptographic
consulting services.
Founded in 1982 by the inventors of the RSA Public Key
Cryptosystem, the company is headquartered in Redwood City, Calif.
--30--jf/sf* eh
CONTACT: RSA Data Security
Patrick Corman, 415/326-9648
corman () cerfnet com
------------------------------------------------------------------------------
Current thread:
- IP: Swiss-based Ph.D. Student Solves 48-bit Key in RSA Data David Farber (Feb 14)
