Interesting quote #1 A web page at MIT has links to programs for algorithms including DES, RC4, and MD5. RC4 is a stream cipher used for web commerce (class discussion, 11/2/99). DES is a block cipher considered here (class discussion, 11/5/99). We may discuss MD5 and authentication later in the course.
... the code linked from this page cannot be exported from the USA, except to Canada. if you are not a citizen of the US or Canada, please find this code elsewhere on the net. |
Interesting quote #2 From chapter 10 of the book Cracking DES (a link to this is given below):
Security is little more than economics. A cryptographic system is secure when it costs more to break it than the data it is protecting is worth. Accordingly, determining the strength of an encryption algorithm comes down to measuring the cost of the cryptanalytic resources needed to break the system. That explains the basic need for an evaluation of the cryptanalytic performance possible today. |
http://whatis.com/des.htm | ||||||||
A very brief description of DES. | ||||||||
http://www.itl.nist.gov/fipspubs/fip46-2.htm | ||||||||
The official description of DES. | ||||||||
http://www.eff.org/descracker/ | ||||||||
The Electronic Freedom Foundation's web page about "cracking DES": many links to press releases, news articles, etc. about the cheapest, fastest publically known way of cracking DES. | ||||||||
http://www.cryptography.com/des/despictures/index.html | ||||||||
Pictures of the cracking machine. | ||||||||
http://www.interhack.net/projects/deschall/what.html | ||||||||
A discussion of ``cracking DES'' by exhaustive search. It describes how such a search can be distributed over the net. This was the most widely publicized method of breaking DES before the machine described above was constructed. | ||||||||
http://www.interhack.net/pubs/des-key-crack/ | ||||||||
A more technical version of the article above including such figures as ``keys searched per day''. | ||||||||
http://www.replay.com/mirror/cracking_des/chap-1.html | ||||||||
The introduction to the book about cracking DES. It includes useful general information on such efforts and introduces some policy questions. | ||||||||
http://www.replay.com/mirror/cracking_des/chap-4.html | ||||||||
The chapter of the cracking book discussing the politics and legalities of publishing a book on cracking DES. | ||||||||
http://www.replay.com/mirror/cracking_des/chap-10.html | ||||||||
An analysis of cracking various common crypto algorithms by exhaustive search of the keyspace. | ||||||||
http://csrc.nist.gov/cryptval/des/fr990115.htm | ||||||||
Recent Federal response to the DES cracking machine (contrast it with statements made only months before by Federal representatives). | ||||||||
http://www.cs.nps.navy.mil/curricula/tracks/security/notes/chap04_29.html\#HEADING28 | ||||||||
This and its successor web pages are nice outlines of many aspects of DES. |