Feeds

56-bit crypto code cracked in a day

Previous record of 56 hours beaten hands down

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

The Electronic Frontier Foundation (EFF) and a worldwide team of Web users has succeeded in cracking the 56-bit Data Encryption Standard (DES) in under 23 hours. That record-setting figure beats the previous attempt, made by the EFF alone, which took 56 hours by around 33 hours 45 minutes. The code was broken using the EFF's specially designed code-cracking computer, Deep Crack, plus an Internet-connected network of 100,000 PCs, collectively known as Dsitributed.net. The operation was promoted by encryption specialist RSA Data Security, which offered $10,000 to anyone who could crack the 56-bit code in under 24 hours. The company's aim was to drive home its claims that 56-bit cryptography, the maximum strength that the US government permits for export, isn't sufficiently secure to protect sensitive data. Cracking the code isn't a subtle process -- essentially the system runs through all the possible combinations of bits in the key until it hits upon the right one -- but the EFF and Distributed.net's efforts show that the technology now exists to make that trial and error process run sufficiently quickly to make this approach feasible. Still, as RSA president put it, "any key size will eventually run out of life", which is why it believes the rules on powerful encryption should be relaxed to allow it to export software that uses much longer keys. The 56-bit DES system was introduced in 1977, and it's now past its sell-by date, says the RSA. ®

Intelligent flash storage arrays

More from The Register

next story
BIG FAT Lies: Porky Pies about obesity
What really shortens lives? Reading this sort of crap in the papers
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.