v
Intro ........................................iiiviForeword ........................................ix
Preface .......................................xiii
1:Overview.....................................1-1
Politics of Decryption ......................1-1
Goals .......................................1-7
History of DES Cracking .....................1-8
EFF's DES Cracker Project ...................1-8
Architecture ................................1-9
Who Else Is Cracking DES? ..................1-16
What To Do If You Depend On DES ............1-17
Conclusion .................................1-182:Design for DES Key Search Array .............2-1
On-Chip Registers ..........................2-1
Commands ....................................2-4
Search Unit Operation .....................2-4
Sample Programming Descriptions .............2-5
Scalability and Performance .................2-9
Host Computer Software ......................2-9
Glossary ...................................2-10
3:Design for DES Key Search Array Chip-Level Specification ..3-1viiASIC Description .........................................3-1
Board description ........................................3-3
Read and Write Timing ....................................3-5
Addressing Registers .....................................3-7
All-active Signal ........................................3-7
ASIC Register Allocation .................................3-84:Scanning the Source Code ..................................41
The Politics of Cryptographic Source Code .................4-1
The Paper Publishing Exception ............................4-2
Scanning ..................................................4-4
Bootstrapping .............................................4-5
5: Software Source Code ......................................5-1
6: Chip Source Code ..........................................6-1
7: Chip Simulator Source Code ................................7-1
8: Hardware Board Schematics .............................................8-1
Board Schematics ......................................................8-1
Sun-4/470 backplane modifications ................................8-10
PC Interfaces .......................................................8-12
Errata ...............................................8-139: Breaking One Million DES Keys by Yvo Desmedt .........9-1
Abstract .............................................9-1
Introduction .........................................9-1
The basic idea .......................................9-2
Details of such a machine ............................9-2
Obtained results and remarks .........................9-4
Conclusion ...........................................9-4
Acknowledgement ......................................9-5
10: Architectural Considerations for Cryptanalytic Hardware .. 10-1Abstract ............................10-1
Introduction ........................10-1
Motivation ..........................10-2
Related work ........................10-4
Technical Approach ..................10-6
Design and Analysis .................10-8
Future work .........................10-23
Conclusions .........................10-23
Acknowledgements ....................10-24
Availability ........................10-24
References ..........................10-2411: Efficient DES Key Search--An Update by Michael J. Wiener 11-1
Advancing Technology ................11-2
Programmable Hardware ...............11-3
Conclusion ............................................................................11-412:Authors ......................................................................12-1
The Electronic Frontier Foundation ....................12-1
John Gilmore ..........................................12-2
Cryptography Research .................................12-2
Paul Kocher ...........................................12-3
Advanced Wireless Technologies ........................12-3
00191 -- Sun Aug 9 19:38:40