Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
EFF DES cracker
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Technology== Deep Crack was designed by [[Cryptography Research|Cryptography Research, Inc.]], Advanced Wireless Technologies, and the [[Electronic Frontier Foundation|EFF]]. The principal designer was [[Paul Carl Kocher|Paul Kocher]], president of Cryptography Research. Advanced Wireless Technologies built 1,856 custom [[Application-specific integrated circuit|ASIC]] DES chips (called ''Deep Crack'' or ''AWT-4500''), housed on 29 circuit boards of 64 chips each. The boards were then fitted in six cabinets and mounted in a [[Sun-4|Sun-4/470]] chassis.<ref name="EUmKi">{{cite book|title=Cracking DES – Secrets of Encryption Research, Wiretap Politics & Chip Design|author=Electronic Frontier Foundation|isbn=1-56592-520-3|publisher=Oreilly & Associates Inc|year=1998|url=https://archive.org/details/crackingdes00elec|df=mdy-all|url-access=registration}}</ref> [[File:Paul kocher deepcrack.jpg|thumb|Paul Kocher of Cryptography Research posing in front of Deep Crack]] The search was coordinated by a single PC which assigned ranges of keys to the chips. The entire machine was capable of testing over 90 billion keys per second. It would take about 9 days to test every possible key at that rate. On average, the correct key would be found in half that time. In 2006, another [[custom hardware attack]] machine was designed based on [[FPGA]]s. [[COPACOBANA]] (COst-optimized PArallel COdeBreaker) is able to crack DES at considerably lower cost.<ref name="6yCLD">{{cite web|url=http://www.sciengines.com/copacobana/faq.html|title=COPACOBANA – Special-Purpose Hardware for Code-Breaking|website=www.sciengines.com|access-date=April 26, 2018|url-status=live|archive-url=https://web.archive.org/web/20160724092435/http://www.sciengines.com/copacobana/faq.html|archive-date=July 24, 2016|df=mdy-all}}</ref> This advantage is mainly due to progress in [[integrated circuit]] technology. In July 2012, security researchers David Hulton and [[Moxie Marlinspike]] unveiled a cloud computing tool for breaking the [[MS-CHAPv2]] protocol by recovering the protocol's DES encryption keys by brute force. This tool effectively allows members of the general public to recover a DES key from a known plaintext–ciphertext pair in about 24 hours.<ref name="IkxJV">{{cite web |url=https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/ |title=Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate |website=CloudCracker.com |date=2012-07-29 |access-date=2016-03-16 |url-status=dead |archive-url=https://web.archive.org/web/20160316174007/https://www.cloudcracker.com/blog/2012/07/29/cracking-ms-chap-v2/ |archive-date=March 16, 2016 |df=mdy-all}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)