📄 07-03.html
字号:
<!-- END SUB HEADER -->
<!--Begin Content Column -->
<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">
<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">
</form>
<!-- Empty Reference Subhead -->
<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=07//-->
<!--PAGES=155-157//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<P><FONT SIZE="+1"><B><I>Viruses</I></B></FONT></P>
<P>The greatest difficulty in getting millions of computers to work on a brute-force attack is convincing millions of computer owners to participate. You could ask politely, but that’s time-consuming and they might say no. You could try breaking into their machines, but that’s even more time-consuming and you might get arrested. You could also use a computer virus to spread the cracking program more efficiently over as many computers as possible.
</P>
<P>This is a particularly insidious idea, first presented in [1593]. The attacker writes and lets loose a computer virus. This virus doesn’t reformat the hard drive or delete files; it works on a brute-force cryptanalysis problem whenever the computer is idle. Various studies have shown that microcomputers are idle between 70 percent and 90 percent of the time, so the virus shouldn’t have any trouble finding time to work on its task. If it is otherwise benign, it might even escape notice while it does its work.</P>
<P>Eventually, one machine will stumble on the correct key. At this point there are two ways of proceeding. First, the virus could spawn a different virus. It wouldn’t do anything but reproduce and delete any copies of the cracking virus it finds but would contain the information about the correct key. This new virus would simply propagate through the computer world until it lands on the computer of the person who wrote the original virus.</P>
<P>A second, sneakier approach would be for the virus to display this message on the screen:</P>
<!-- CODE SNIP //-->
<PRE>
There is a serious bug in this computer.
Please call 1-800-123-4567 and read the
following 64-bit number to the operator:
xxxx xxxx xxxx xxxx
There is a $100 reward for the first
person to report this bug.
</PRE>
<!-- END CODE SNIP //-->
<P>How efficient is this attack? Assume the typical infected computer tries a thousand keys per second. This rate is far less than the computer’s maximum potential, because we assume it will be doing other things occasionally. Also assume that the typical virus infects 10 million machines. This virus can break a 56-bit key in 83 days and a 64-bit key in 58 years. You might have to bribe the antiviral software makers, but that’s your problem. Any increase in computer speeds or the virus infection rate would, of course, make this attack more efficient.
</P>
<P><FONT SIZE="+1"><B><I>The Chinese Lottery</I></B></FONT></P>
<P>The Chinese Lottery is an eclectic, but possible, suggestion for a massively parallel cryptanalysis machine [1278]. Imagine that a brute-force, million-test-per-second cracking chip was built into every radio and television sold. Each chip is programmed to test a different set of keys automatically upon receiving a plaintext/ciphertext pair over the airwaves. Every time the Chinese government wants to break a key, it broadcasts the data. All the radios and televisions in the country start chugging away. Eventually, the correct key will appear on someone’s display, somewhere in the country. The Chinese government pays a prize to that person; this makes sure that the result is reported promptly and properly, and also helps the sale of radios and televisions with the cracking chips.
</P>
<P>If every man, woman, and child in China owns a radio or television, then the correct key to a 56-bit algorithm will appear in 61 seconds. If only 1 in 10 Chinese owns a radio or television—closer to reality—the correct key will appear in 10 minutes. The correct key for a 64-bit algorithm will appear in 4.3 hours—43 hours if only 1 in 10 owns a radio or television.</P>
<P>Some modifications are required to make this attack practical. First, it would be easier to have each chip try random keys instead of a unique set of keys. This would make the attack about 39 percent slower—not much in light of the numbers we’re working with. Also, the Chinese Communist party would have to mandate that every person listen to or watch a certain show at a certain time, just to make sure that all of the radios and televisions are operating when the plaintext/ciphertext pair is broadcast. Finally, everyone would have to be instructed to call a Central-Party-Whatever-It’s-Called if a key ever shows up on their screen, and then to read off the string of numbers appearing there.</P>
<P>Table 7.2 shows the effectiveness of the Chinese Lottery for different countries and different key lengths. China would clearly be in the best position to launch such an attack if they have to outfit every man, woman, and child with their own television or radio. The United States has fewer people but a lot more equipment per capita. The state of Wyoming could break a 56-bit key all by itself in less than a day.</P>
<P><FONT SIZE="+1"><B><I>Biotechnology</I></B></FONT></P>
<P>If biochips are possible, then it would be foolish not to use them as a distributed brute-force cryptanalysis tool. Consider a hypothetical animal, unfortunately called a “DESosaur” [1278]. It consists of biological cells capable of testing possible keys. The plaintext/ciphertext pair is broadcast to the cells via some optical channel (these cells are transparent, you see). Solutions are carried to the DESosaur’s speech organ via special cells that travel through the animal’s circulatory system.
</P>
<P>The typical dinosaur had about 10<SUP>14</SUP> cells (excluding bacteria). If each of them can perform a million encryptions per second (granted, this is a big if), breaking a 56-bit key would take seven ten-thousandths of a second. Breaking a 64-bit key would take less than two tenths of a second. Breaking a 128-bit key would still take 10<SUP>11</SUP> years, though.</P>
<TABLE WIDTH="100%"><TR>
<TH CAPTION ALIGN="CENTER" COLSPAN="5">Table 7.2<BR>Brute-Force Cracking Estimates for Chinese Lottery
<TR>
<TD COLSPAN="5"><HR>
<TR>
<TH WIDTH="25%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="20%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="20%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="20%" ALIGN="CENTER" VALIGN="BOTTOM">
<TH WIDTH="15%" ALIGN="CENTER" VALIGN="BOTTOM">
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM">
<TH ALIGN="CENTER" VALIGN="BOTTOM">
<TH ALIGN="CENTER" VALIGN="BOTTOM">
<TH COLSPAN="2" ALIGN="CENTER" VALIGN="BOTTOM">Time to Break
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">
<TD ALIGN="CENTER" VALIGN="BOTTOM">
<TD COLSPAN="2"><HR>
<TR>
<TH ALIGN="LEFT" VALIGN="BOTTOM">Country
<TH ALIGN="CENTER" VALIGN="BOTTOM">Population
<TH ALIGN="CENTER" VALIGN="BOTTOM"># of Televisions/Radios
<TH ALIGN="CENTER" VALIGN="BOTTOM">56-bit
<TH ALIGN="CENTER" VALIGN="BOTTOM">64-bit
<TR>
<TD COLSPAN="5"><HR>
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">China
<TD ALIGN="CENTER" VALIGN="BOTTOM">1,190,431,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">257,000,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">280 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">20 hours
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">U.S.
<TD ALIGN="CENTER" VALIGN="BOTTOM">260,714,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">739,000,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">97 seconds
<TD ALIGN="CENTER" VALIGN="BOTTOM">6.9 hours
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Iraq
<TD ALIGN="CENTER" VALIGN="BOTTOM">19,890,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">4,730,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">4.2 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">44 days
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Israel
<TD ALIGN="CENTER" VALIGN="BOTTOM">5,051,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">3,640,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">5.5 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">58 days
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Wyoming
<TD ALIGN="CENTER" VALIGN="BOTTOM">470,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">1,330,000
<TD ALIGN="CENTER" VALIGN="BOTTOM">15 hours
<TD ALIGN="CENTER" VALIGN="BOTTOM">160 days
<TR>
<TD ALIGN="LEFT" VALIGN="BOTTOM">Winnemucca, NV
<TD ALIGN="CENTER" VALIGN="BOTTOM">6,100
<TD ALIGN="CENTER" VALIGN="BOTTOM">17,300
<TD ALIGN="CENTER" VALIGN="BOTTOM">48 days
<TD ALIGN="CENTER" VALIGN="BOTTOM">34 years
<TR>
<TD COLSPAN="5"><HR>
<TR>
<TD COLSPAN="3" ALIGN="LEFT" VALIGN="BOTTOM">(All data is from the <I>1995 World Almanac and Book of Facts.</I>)
</TABLE>
<P>Another biological approach is to use genetically engineered cryptanalytic algae that are capable of performing brute-force attacks against cryptographic algorithms [1278]. These organisms would make it possible to construct a distributed machine with more processors because they could cover a larger area. The plaintext/ciphertext pair could be broadcast by satellite. If an organism found the result, it could induce the nearby cells to change color to communicate the solution back to the satellite.
</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="07-02.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="07-04.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
[an error occurred while processing this directive]
<!-- all of the reference materials (books) have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- BEGIN SUB FOOTER --> <br><br> </TD> </TR> </TABLE> <table width="640" border=0 cellpadding=0 cellspacing=0> <tr> <td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td> <!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- FOOTER --> <td width="515" align="left" bgcolor="#FFFFFF"><font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a> | <a href="/contactus.html"><font color="#006666">Contact Us</font></a> | <a href="/aboutus.html"><font color="#006666">About Us</font></a> | <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> | <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> | <a href="/"><font color="#006666">Home</font></a></b> <br><br> Use of this site is subject to certain <a href="/agreement.html">Terms & Conditions</a>, <a href="/copyright.html">Copyright © 1996-1999 EarthWeb Inc.</a><br> All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p></td> </tr></table></BODY></HTML><!-- END FOOTER -->
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -