[cryptography] Current state of brute-forcing random keys?

Paul Hoffman paul.hoffman at vpnc.org
Fri Jun 10 10:28:40 EDT 2011


On Jun 9, 2011, at 7:34 PM, Sandy Harris wrote:

> One indicator is the Copacobana machine, built from FPGAs, The first
> version a few
> years back cost 9,000 euro and broke DES in a week. There's a later version.
> http://www.copacobana.org/
> 
> Of course a bunch of those in parallel could break it faster. That's a
> 56-bit key. 64-bit
> is 256 times harder, but certainly within reach of an attacker with
> large resources.
> 
> Judging solely by this, only someone with a huge budget, such as a major
> nation's intelligence agency, could afford to attack 80-bit keys.

On Jun 9, 2011, at 10:11 PM, Solar Designer wrote:

> Here's a smaller implementation:
> 
> http://www.invia.fr/AES-20.html

Thanks, that is exactly the kind of hard data I was looking for!

--Paul Hoffman




More information about the cryptography mailing list