SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : C-Cube -- Ignore unavailable to you. Want to Upgrade?


To: John Rieman who wrote (38317)1/20/1999 5:57:00 PM
From: BillyG  Read Replies (2) | Respond to of 50808
 
From the Divx site: <<The Divx enhancement also includes a unique encryption technology that employs several layers of security; the most robust of which is called Triple D.E.S. The multiple layers of special encryption technology is what convinced six movie studios, including 20th Century Fox and DreamWorks, to support Divx.>>

Single DES encryption was broken in 23 hours. I wonder how "secure" those "triple-DES" Divx movies really are?
news.com

Record set in cracking 56-bit crypto

By Tim Clark
Staff Writer, CNET News.com
January 19, 1999, 6:30 p.m. PT

update SAN JOSE, California--A joint effort between the Electronic Frontier
Foundation and Distributed.Net has set a new record for cracking the 56-bit Data
Encryption Standard (DES) algorithm--under 23 hours.

That beats a record of 56 hours set in July by EFF's "Deep Crack" machine, a specially
built computer for breaking the code. RSA Data Security, which sponsored its third
DES-cracking contests, offered $10,000 to anyone who broke DES in under 24 hours. It
will pay EFF and Distributed.Net, a worldwide coalition of computer enthusiasts.

Deep Crack and Distributed.Net's network of nearly 100,000 PCs on the Internet won DES
Challenge III in 22 hours and 15 minutes.

"When designing secure systems and infrastructure for society, listen to cryptographers,
not to politicians," said John Gilmore, the EFF co-founder who headed the Deep Crack
project. He said the record time to crack DES should send "a wake-up call" to anyone who
relies on DES to keep data private.


RSA sponsors periodic DES-cracking contests to demonstrate that 56-bit encryption, the
strongest allowed for export by the U.S. government, is no longer adequate.

Gilmore complained about "mixed signals from the [U.S.] government." Last week, he
noted, the National Institute of Standards and Technology [NIST] urged the use of
Triple-DES rather than DES for security while the Commerce Department limits encryption
exports to products with 56-bit crypto--the kind just broken in the RSA challenge.
Triple-DES uses the three separate DES keys, so an attacker would have to break the
code three separate times.


RSA president Jim Bidzos, a frequent critic of government crypto policy who has been
rather quiet lately, defended DES.

"We came not to bury DES but to praise it," said Bidzos. "DES was a very strong
algorithm. But any algorithm, any key size, will eventually run out of life. DES has served
well over the last 23 or 24 years."

Paul Kocher, who created the software side of Deep Crack, praised RSA, where he once
worked, for sponsoring the DES Challenge.

"RSA has been one of few companies that encourage people to attack systems; and as a
result they are one of the most reputable in the industry," said Kocher, president of
Cryptographic Research, a consulting firm.

Bizdos called the current policy "simply out of date," adding "industry, businesses, and
individuals should be free to use the level encryption they choose. This is the proof--DES is
breakable, no question about that."

To break the code, the cryptographic key that encrypted a secret message was parceled
out to computers linked via Distributed.Net and to Deep Crack, which EFF built last year
for under $250,000. The network was testing 245 billion keys per second when the correct
key was found.

Adopted in 1977 by the U.S. government, 56-bit DES is widely used by U.S. government
agencies and financial institutions. The government is now mid-way through a lengthy
process to create a new standard algorithm called Advanced Encryption Standard or AES
with encryption keys of at least 128 bits.

The encrypted message, "See you in Rome [second AES Conference, March 22-23,
1999]," referred to the AES initiative.