[cryptography] Current state of brute-forcing random keys?
paul.hoffman at vpnc.org
Fri Jun 10 10:28:40 EDT 2011
On Jun 9, 2011, at 7:34 PM, Sandy Harris wrote:
> One indicator is the Copacobana machine, built from FPGAs, The first
> version a few
> years back cost 9,000 euro and broke DES in a week. There's a later version.
> Of course a bunch of those in parallel could break it faster. That's a
> 56-bit key. 64-bit
> is 256 times harder, but certainly within reach of an attacker with
> large resources.
> Judging solely by this, only someone with a huge budget, such as a major
> nation's intelligence agency, could afford to attack 80-bit keys.
On Jun 9, 2011, at 10:11 PM, Solar Designer wrote:
> Here's a smaller implementation:
Thanks, that is exactly the kind of hard data I was looking for!
More information about the cryptography