v

Table of Contents

Intro ........................................iii

Foreword ........................................ix

Preface .......................................xiii

1:Overview.....................................1-1

Politics of Decryption ......................1-1
Goals .......................................1-7
History of DES Cracking .....................1-8
EFF's DES Cracker Project ...................1-8
Architecture ................................1-9
Who Else Is Cracking DES? ..................1-16
What To Do If You Depend On DES ............1-17
Conclusion .................................1-18

2:Design for DES Key Search Array .............2-1

On-Chip Registers ..........................2-1
Commands ....................................2-4
Search Unit Operation .....................2-4
Sample Programming Descriptions .............2-5
Scalability and Performance .................2-9
Host Computer Software ......................2-9
Glossary ...................................2-10
vi
3:Design for DES Key Search Array Chip-Level Specification ..3-1
ASIC Description .........................................3-1
Board description ........................................3-3
Read and Write Timing ....................................3-5
Addressing Registers .....................................3-7
All-active Signal ........................................3-7
ASIC Register Allocation .................................3-8

4:Scanning the Source Code ..................................41

The Politics of Cryptographic Source Code .................4-1
The Paper Publishing Exception ............................4-2
Scanning ..................................................4-4
Bootstrapping .............................................4-5

5: Software Source Code ......................................5-1

6: Chip Source Code ..........................................6-1

7: Chip Simulator Source Code ................................7-1

8: Hardware Board Schematics .............................................8-1

Board Schematics ......................................................8-1
Sun-4/470 backplane modifications ................................8-10
PC Interfaces .......................................................8-12
Errata ...............................................8-13

9: Breaking One Million DES Keys by Yvo Desmedt .........9-1

Abstract .............................................9-1
Introduction .........................................9-1
The basic idea .......................................9-2
Details of such a machine ............................9-2
Obtained results and remarks .........................9-4
Conclusion ...........................................9-4
Acknowledgement ......................................9-5

vii
10: Architectural Considerations for Cryptanalytic Hardware .. 10-1
Abstract ............................10-1
Introduction ........................10-1
Motivation ..........................10-2
Related work ........................10-4
Technical Approach ..................10-6
Design and Analysis .................10-8
Future work .........................10-23
Conclusions .........................10-23
Acknowledgements ....................10-24
Availability ........................10-24
References ..........................10-24

11: Efficient DES Key Search--An Update by Michael J. Wiener 11-1

Advancing Technology ................11-2
Programmable Hardware ...............11-3
Conclusion ............................................................................11-4

12:Authors ......................................................................12-1

The Electronic Frontier Foundation ....................12-1
John Gilmore ..........................................12-2
Cryptography Research .................................12-2
Paul Kocher ...........................................12-3
Advanced Wireless Technologies ........................12-3

00191 -- Sun Aug 9 19:38:40