← Back to Concept Index

brute-force-attack

A cryptanalytic method involving exhaustive search of all possible keys to decrypt a message, which was considered feasible against DES due to its relatively short key length.

4 chapters across 2 books

Crypto (2001)Steven Levy

Chapter 6

The chapter discusses the introduction and controversy surrounding the Data Encryption Standard (DES) announced by the National Bureau of Standards in 1975, highlighting concerns by cryptographers Martin Hellman and Whit Diffie about the NSA's involvement and the insufficient 56-bit key length that made DES vulnerable to brute-force attacks. It also traces the origins of DES to IBM researcher Horst Feistel, who developed the Lucifer cipher, a strong block cipher designed to protect individual privacy against database intrusions, emphasizing the tension between national security secrecy and the need for public cryptographic standards.

Chapter 13

The chapter explores the evolving landscape of cryptography in the mid-1990s, highlighting the tension between government agencies and emerging crypto-anarchists. It focuses on Phil Zimmermann's PGP software and the challenges of ensuring cryptographic security against both brute-force and subtle implementation attacks. The narrative culminates in the collaborative Internet-driven effort led by Derek Atkins and others to factor the RSA 129 challenge, demonstrating the power of distributed computing in cryptanalysis.

Artificial Life: How Computers Are Transforming Our Understanding of Evolution and the Future of Life (2001)Steven Levy

Chapter 7

This chapter explores the origins and controversies surrounding the Data Encryption Standard (DES), highlighting the skepticism of cryptographers Martin Hellman and Whit Diffie about its 56-bit key length and potential NSA influence. It traces the development of DES back to IBM researcher Horst Feistel, who designed the Lucifer cipher with privacy protection as a key motivation, emphasizing the tension between government secrecy and individual privacy in cryptography.

Chapter 14

By 1995, cryptography had evolved rapidly, propelled by computer power and new discoveries, yet the fundamental conflict between code makers and code breakers persisted. Phil Zimmermann's PGP software exemplified the challenges of creating strong encryption accessible to the public, while government agencies acknowledged the difficulty of breaking such codes with brute force. Meanwhile, a new generation of crypto enthusiasts, including Derek Atkins and collaborators, leveraged distributed Internet computing power to attempt factoring the RSA 129 challenge, demonstrating the potential of collective cryptanalysis beyond traditional institutional capabilities.