Advertisement

DES Cracking on the Transmogrifier 2a

  • Ivan Hamer
  • Paul Chow
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1717)

Abstract

The Cryptographic Challenges sponsored by RSA Laboratories have given some members of the computing community an opportunity to participate in some of the intrigue involved with solving secret messages. This paper describes an effort to build DES-cracking hardware on a field-programmable system called the Transmogrifier 2a. A fully implemented system will be able to search the entire key space in 1040 days at a rate of 800 million keys/second.

Keywords

Secret Message Logic Device Cipher Text Data Encryption Standard FPGA Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    RSA Laboratories. http://www.rsa.com/rsalabs/.
  2. 2.
    Data Encryption Standard. National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, 1977.Google Scholar
  3. 3.
    David M. Lewis, David R. Galloway, Marcus van Ierssel, Jonathan Rose, and Paul Chow. The Transmogrifier-2: A 1 Million Gate Rapid Prototyping System. IEEE Transactions on VLSI Systems, 6(2):188–198, June 1998.Google Scholar
  4. 4.
  5. 5.
    Michael J. Wiener. Efficient DES Key Search. In W. Stallings, editor, Practical Cryptography for Data Internetworks, pages 31–97. IEEE Computer Society Press, 1996. First presented at the Rump session of Crypto’ 93 and also available by searching the WWW.Google Scholar
  6. 6.
  7. 7.
  8. 8.
    Electronic Frontier Foundation, editor. Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472, 1998.Google Scholar
  9. 9.
  10. 10.
  11. 11.
    Electronic Frontier Foundation, editor. Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design, chapter 11. O’Reilly & Associates, Inc., 101 Morris Street, Sebastopol, CA 95472, 1998.Google Scholar
  12. 12.
    Tom Kean and Ann Duncan. DES Key Breaking, Encryption and Decryption on the XC6216. In IEEE Symposium on FPGAs for Custom Computing Machines, pages 310–311, 1998.Google Scholar
  13. 13.
  14. 14.
  15. 15.
    Carolynn Bernier. DES Cracking on the TM-2. Undergraduate summer project report, 1997.Google Scholar
  16. 16.
    Kathleen Lam. Implementation and Optimization of a DES Cracking Circuit on the Transmogrifier-2 and the Transmogrifier-2a. B.A.Sc. thesis, Division of Engineering Science, Faculty of Applied Science and Engineering, University of Toronto, supervised by Professor Paul Chow, 1998.Google Scholar
  17. 17.
    Brian von Herzen. Signal Processing at 250 MHz using High-Performance FPGAs. In International Symposium on Field Programmable Gate Arrays, pages 62–68. ACM/SIGDA, 1997.Google Scholar
  18. 18.
    Bruce Schneier. Applied Cryptography. John Wiley and Sons, New York, 2nd edition, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Ivan Hamer
    • 1
  • Paul Chow
    • 1
  1. 1.Department of Electrical and Computer EngineeringUniversity of TorontoTorontoCanada

Personalised recommendations