Advertisement

BT Technology Journal

, Volume 17, Issue 2, pp 69–73 | Cite as

Distributed Computing Attacks on Cryptographic Systems

  • A. P. L. Selkirk
  • A. E. Escott
Article

Abstract

It is now possible to link large numbers of desktop computers to achieve massive computing power. This paper briefly describes approaches taken to attack cryptographic algorithms using this method. The approach taken by BT Laboratories in the successful attack on an elliptic curve cipher is detailed. Finally a proposal for the architecture needed to recruit unused computing power for similar problems is given.

Keywords

Information System Communication Network User Interface Computing Power Elliptic Curve 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Stinson D R: 'Cryptography Theory and Practice', CRC Press (1995).Google Scholar
  2. 2.
    Distributed Computing Technologies — http://www.distributed.netGoogle Scholar
  3. 3.
    RSA challenges — http://www.rsa.com/rsalabs/html/challenges.htmlGoogle Scholar
  4. 4.
    EFF DES Cracker — http://www.eff.org/pub/Privacy/Crypto_misc/DESCracker/Google Scholar
  5. 5.
    Certicom ECC challenges — http://www.certicom.com/chal/index.htm (1997).Google Scholar
  6. 6.
    BT's ECCp-97 challenge submission (March 1998) — http://www.labs.bt.com/projects/ security/crackers/p-97.txtGoogle Scholar
  7. 7.
    Miller V: 'Uses of elliptic curves in cryptography', Advances in Cryptolog — CRYPTO '85, Lecture Notes in Computer Science, No 218, pp 417-426, Springer-Verlag (1986).Google Scholar
  8. 8.
    Koblitz N: 'Elliptic curve cryptosystems', Mathematics of Computation, No 48, pp 203-209 (1987).Google Scholar
  9. 9.
    van Oorschot P C and Wiener M J: 'Parallel collision search with cryptanalytic applications', Journal of Cryptography, to appear.Google Scholar
  10. 10.
    The Mersenne Primes organisation — http:www.mersenne.org/prime.htmGoogle Scholar
  11. 11.
    The Search for Extraterrestrial Intelligence (SETI) — http://setiathome.ssl.berkeley.edu/Google Scholar
  12. 12.
    Beowulf — http://cesdis.gsfc.nasa.gov/linux/beowulf/beowulf.htmlGoogle Scholar

Copyright information

© Kluwer Academic Publishers 1999

Authors and Affiliations

  • A. P. L. Selkirk
  • A. E. Escott

There are no affiliations available

Personalised recommendations