Langbahn Team – Weltmeisterschaft

Talk:EFF DES cracker

The EFF documented their work in https://www.amazon.de/Cracking-Encryption-Electronic-Foundation-1998-07-11/dp/B01FKT85AW, but I fail to spot that link on this page. The book describes the machine, and contains the source for the chips. -- 5.57.21.129 (talk) 12:54, 31 August 2016 (UTC)[reply]

Chips

What did the custom made chips do? Why didn't they use regular cpus for their tasks? --Abdull 23:29, 3 October 2005 (UTC)[reply]

General CPUs are much slower than dedicated custom processors, since they are designed to be flexible and generic. With a general CPU, you must issue several hundred instructions just to check one key before you can start the next one (ie: one key per several hundred clock cycles). With a custom processors, it will be limited to only running that specialized instruction, but it can have an entire processor pipeline set up to checking an entire key. Each stage of the pipeline would connect solely to the next stage of the key check, and several keys may be in progress simultaneously (ie: one key per few clock cycles, with many keys in the pipeline).-- Bovineone 01:30, 4 October 2005 (UTC)[reply]

Controversy

I seem to recall that EFF took some heat at the time from those who felt there were better uses for $250,000 than to demonstrate the vulnerability of an encryption standard already widely considered insecure. I don't want to add language to this effect in the article without a noteworthy citation, which I haven't found yet. Does anyone else recall this controversy? I think there was some crossover with those who felt Barlow took the group the wrong way on Digital Telephony.--Skyraider 00:46, 3 February 2006 (UTC)[reply]

I don't think there was that much controversy, just some slight skepticism here and there about whether the effort was worth it. I also don't have the sense that EFF paid the $250K out of membership dues and small donations, that might instead of have been used for something else. Rather, my impression is that one of the EFF's wealthy founders (JG) funded the project pretty much by himself, because he wanted to see it happen. Phr 06:40, 12 April 2006 (UTC)[reply]

I read that it was several million keys per second, not billion. Also my friend's book stated $200,000 not $250,000. Someone with more resources should verify these numbers...

It was definitely billions of keys per second. The machine could search the whole 256=7×1016 keyspace in about a week, so that's around 1011 keys/sec. Phr (talk) 05:31, 2 May 2006 (UTC)[reply]

Number of custom chips contradiction

There is a difference of 10x between the EFF DES cracker and Brute force attack image capations each indicating '1800' and '18,000' chips respectively. When searching 1800 appears to be the correct amount, but it would be good to confirm.--ShaunMacPherson 16:54, 15 July 2006 (UTC)[reply]

When is it done

Q: If a machine tries 2^56 keys to decrypt a message, how does it know when it is done? It would have up to 2^56 output strings that would then need to be processed to see whether they seem like the message or gobbledegook.DouglasHeld 21:15, 22 May 2007 (UTC)[reply]

After each attempted decryption, the chip checks whether the decrypted plaintext matches the excepted plaintext. If yes, it has found the key, and the crack is over. So, searching the whole 256 keyspace actually takes 255 decryptions on average. -- intgr #%@! 20:57, 23 May 2007 (UTC)[reply]
If there was no portion of plaintext available, then decryption would be impossible? The only solutions I can imagine is checking if words in decrypted message are in English dictionary, or trying to find a file format header in decrypted message. Thatadmit1 (talk) 12:29, 5 December 2010 (UTC)[reply]
There is no need for speculation here. The "Cracking DES" book does describe the possibilities built into the chips that allow to filter unlikely ciphertexts from potenially correct ones. 83.79.119.106 (talk) 13:35, 5 December 2010 (UTC)[reply]

Sun-4/470

Maybe there should be some reference to the machine being built in a Sun-4/470 chasis (VMEbus-based). A minor point, but perhaps of interest. Thanks. 75.142.145.210 (talk) 20:37, 23 April 2008 (UTC)[reply]

Footnote 1 under References.

The first URL appears to be a broken link. 75.142.145.210 (talk) 20:40, 23 April 2008 (UTC)[reply]

Number of chips/boards

I've seen numbers of anywhere from 24 to 27 boards at 64 chips/board. What is the source for 29? --Doctorhook (talk) 00:53, 11 February 2010 (UTC)[reply]

Hello fellow Wikipedians,

I have just modified 3 external links on EFF DES cracker. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—InternetArchiveBot (Report bug) 15:40, 15 September 2017 (UTC)[reply]