Interesting People mailing list archives

IP: NIST Credits EFF's Deep Crack for its move to Triple-DES


From: Dave Farber <farber () cis upenn edu>
Date: Sun, 17 Jan 1999 09:17:41 -0500



Date: Fri, 15 Jan 1999 10:10:02 -0500
To: cryptography () c2 net
From: John Young <jya () pipeline com>
Subject: NIST Credits Deep Crack

NIST credits Deep Crack as the reason for proposing 
using 3DES in lieu of DES in its new FIPS 46-3 (previously
posted <http://jya.com/nist011599.txt>:

Quote:

    Recently claims have been made of a special-purpose 
hardware based attack on the DES. In light of this most 
recent attack, NIST can no longer support the use of the 
DES for many applications. As with other security tools, 
encryption must balance cost against risk. The recent
brute force exhaustion attack by a ``cracking machine'' 
costing $250,000 took 56 hours to crack a single 
message.

With this special-purpose technology, the average time 
of cracking per message would be twice that, since only 
a quarter of all keys were tested. In some cases this kind 
of attack may not pose an immediate or significant threat
--for example where short-term protection of perishable 
information is desired. However, advances in technology 
are likely to further reduce the average cracking time. 
Therefore, NIST recommends the following:

--For existing systems, develop a prudent transition strategy 
to move to Triple DES. This strategy should match the 
strength of the protective measures against the associated 
risk. Critical systems should receive priority

--When building new systems, use Triple DES to protect 
sensitive, unclassified data

End quote

BTW, we've not been able to access CSRC today to get
the new FIPS. Anybody got the same problem? Miles Smid's
phone has been continually busy as well. Moreover, BXA has
been having problems at its site. Any connection to yesterday's
article in Federal Computer Week about lax standards and 
training for federal webmasters, or just the usual terrorist attack?


Current thread: