Newsgroups: sci.crypt From: kaplan@bpavms.bpa.arizona.edu (Steve... friends don't let friends do DOS.) Subject: Is DES breakable? Keywords: DES breakability Message-ID: <23MAR199319384593@bpavms.bpa.arizona.edu> Date: 24 Mar 93 02:38:00 GMT Organization: University of Arizona MIS Department Lines: 201 Greetings sci.crypters This is a lengthy posting born of my idea that one good turn deserves another. Carl Ellison (cme@ellisun.sw.stratus.com) was kind enough to send me the out dated, but still useful FAQ for this news group. So, I figure that I should add to the positive karma of it by sharing some stuff. Not new news - just restatement of what some have already said. Hope that it is worthy of your time. If not - send me mail and complain! In other groups I get flamed for not being able to find my butt in the dark with both hands, so - sorry if I've violated and status quo of which I am not aware! RayK 8) ---- (Previously submitted for publication in Wynn Schwartau's Security Insider newsletter: 1157 Grove St. N., Seminole, FL 34642, 813-393-6600 and the Computer Security Institute's ALERT newsletter: 600 Harrison St., San Franciscon, Ca. 94107, 415-905-2370) Is DES breakable? Of course. by Ray Kaplan Copyright Ray Kaplan 1993 - All rights attempting to be reserved - At least, please make the site correct if you use it! Day two of the second annual RSA Data Security Data Security Conference in Redwood City, CA (January 15, 1993) was packed full of great sessions. Right out of the can in the cryptographer's track was Dr. Martin Hellman presenting a talk entitled DES Revisited. The Data Encryption Standard (DES) was first approved in January 1977, so it is now 16 years old. NIST did approve extending it at least once since then, but Rthe DESS (as crypto insiders seem to refer to it) is due for a look-see. Since Dr. Hellman has been involved with DES from its beginning, I trust his critical academic appraisal - especially since he and Whit Diffie were embattled with NBS over questions of key size and the existence of trap doors when DES was being introduced. In the question of DES breakability, I like his approach. They designed an attack on DES that is based on the most intensive cryptanalysis: exhaustive search. The beauty of this theoretical DES solution machine is that is can be used for plain text, ciphertext and chosen text attacks on the algorithm. Solve the hardest problems first and the easy ones follow quickly, I say. He presented their 1976 design for an exhaustive DES solution engine and updated it to 1993. Since the DES algorithm is roughly equivalent to 6,000 gates, it is about the complexity of a Z80 microprocessor to implement in silicon. DES uses a 64 bit key with 8 bits reserved for parity and that means that there are 2**56 (10**17) possible DES keys for any given DES encoding. Building the exhaustive search machine in 1976 would have required 1,000,000 special DES search engine ICs and would have cost $20 million. Today, this would be10,000 special DES search engine ICs since IC's are about 100x denser than in 1976. Dr, Hellman points out that the $20M cost figure has been criticized as optimistic and he indicates that his estimate may have been a bit low. $50M is a safer figure and doesn't change his basic argument about how you go about breaking the DES. In 1976, their solution machine yielded one DES solution per day at a cost of $10,000 each. Updating this to 1993 costs and computing speeds, the capital cost of such an exhaustive search DES solution machine that would yield one DES solution per day would be between $1 and $10 million dollars. This nets a cost per DES solution of only $100. Dr. Hellman points out that the $10M figure is a relatively safe one that includes the design cost. The $1M figure is optimistic if it includes design cost, but is safe if it is the replication cost after design. This, should one want to build more than one machine - quite possible depending on who one is and how many messages he would like to read. He also indicated the replication cost might go as low as $100k per machine. The $100 figure per solution was an order of magnitude estimate. It could be as high as $1,000 (using the $10M figure) or as low as $10 (using the $100k figure). Such a special DES search engine ICs would be about as complex as a modern 386 microprocessor and cost about as much as a Z80 to design. The whole machine has 10,000 such search chips. The reason: the 1976 design (comparable to a Z80) is replicated 128 times on the chip, but only needs to be designed once. Using 128 search engines per IC (plus spares) and a common data bus (considering the very low I/O level), the DES solution machine has only about 10,000 ICs. Past the fascinating technical details of his machine were his summary comments about DES. It has many honors: world's most widely used, cheapest and public cryptosystem. Despite major incentives, it has not been publicly broken. For those who remember him as a combatant 15 years ago, it might be helpful to mention that he indicated that he has recognized that in the heat of previous battle, he tended to overlook arguments that supported NSA/NBS and was trying now, with the benefit of age and a relative peace, to summarize the pros and cons in a more unbiased fashion. His concerns: 1) the 56 bit key size allows exhaustive searches by dedicated opponents at a capital cost of between $1 and $10 million, 2) Biham and Shamir's differential cryptanalysis can break an 8 round DES implementation and 3) DES's design principals are secret (despite the fact that the algorithm itself is public) and may allow trap doors. His conclusions: there is probably no trap door in DES, but the 56 bit key size and decades of experience in production cryptanalysis probably give the NSA and its foreign counterparts a crude trap door. According to Dr. Hellman, this needs a bit of explanation since these two ideas two sound counter to one another. He indicated that, while he was very concerned about a possible trap door in the 70's, direct denial of NSA pressure on S-box design from relevant IBM personnel caused him to doubt their presence for some time. However, he says he could be wrong, hence the "may allow" in his statement about possible trap doors. The key appears to be that it is all speculation since the design principals of DES (not the algorithm itself) are carefully guarded. In summary: DES protected data is probably secure against all commercial attacks today, but is almost surely vulnerable to attack by a major power. DES will continue to dominate the market for a decade. He recommends immediate triple encryption (the use of a 48 round algorithm - Rstandard DESS uses a 16 round algorithm.) to defeat differential cryptanalysis. Continued federal support of DES is critical to vendors and users. In the end, he admonished NIST/NSA to stop dragging their feet on a public key exchange standard but suggests that perhaps a de facto standard is better (in which case it doesn't matter if NIST/NSA do anything since RSA and Diffie-Hellman are filling this de facto role). Adding some humor, he softened the harsh "dragging their feet" in his talk by noting that NIST's Dennis Branstad credited his ruckuses for two promotions and indicated that Branstad had asked him to help him with a third. As is usually the case, the hallway conversations were best. We speculated on cheap DES solution machine technology. The fact is that for about $5,000 you can buy a gate array programmer and at a cost of about $250 per part, you could build your own DES solution machine without the cost and complexity of a custom silicon implementation. Scary, huh? Yes. But, the higher higher cost per part translates into a higher cost per solution so you'd have to check the speed, density, etc. and see what the associated cost would be. I asked Hellman how in the hell a layman could possibly keep up with this crypto technology and come to trust it. His answer was revealing: read and study it - get politically involved and, it will yield to your efforts. He suggests that you contact your congressional rep and let them know you are unhappy at DoD (NSA) messing around with your personal privacy (e.g. medical records are protected by DES) when Commerce is supposed to be setting standards with regard to commercial and individual needs, rather than NSA's needs. He said that a reasonably trained EE or CS type can understand the technical details and you have a responsibility to help keep the technology on track and to help answer some of the hard questions surrounding its use. Go find a trusted member of the community to talk with about these important issues. We also had a spirited discussion of Dr. Hellman's involvement with the Russian Institute for Problems of Information Transmission (IPPI after the Russian name Institut Problem Peredachi Informatsii) in his efforts to help some old friends of his and help the budding democratic movement in the former Soviet Union. I agree with him that we need to help them. I was comforted to find that this world-class crypotgrapher is quite a humanitarian. I agree that we do have a responsibility to help - lest we see our technology (such as cryptography) protect and nurture backward and barbaric customs. Consider that white supremacist groups such as the KKK and the Aryan Nation are a similar threat to our humanity right here in our own back yard. Heady stuff. The IPPI is interested in hard currency (e.g.: dollar vs. ruble) contracts for work. They are reported to be quite a bit less expensive that other alternatives. If you are interested in hiring them, you can contact Deputy Director Dr. Josef Ovseyevitch at IPPI via Email at ovseev@ippi.msk.su. They are interested in error correcting/detecting codes, data compression, crypto, signal processing, computer and communications networks, computational linguistics and machine translation, and experimental data processing. My thanks to Dr. Hellman for help in writing up this account of his talk and to Jim Bidzos from RSA for inviting Dr. Hellman to speak at the RSA Data Security Conference. Ray Kaplan is a principle in the Tucson, Arizona-based independent consulting firm Kaplan, Kovara and Associates. They specialize in systems and network management, and security with an emphasis on Open VMS, UNIX, DECnet and TCP/IP. They are currently producing a series of audio teleconferences on contemporary security-related topics. For a catalog of their offerings, contact them at P.O. Box 42650 - Tucson, AZ 85733 - FAX (602) 791-3325 - (602) 885-2807. They'll be conducting live audio teleconferences on encryption and authentication which will include a live interviews and Q/A sessions with Dr. Hellman and other experts on April 7 and 8, 1992.