Previous | Table of Contents | Next |
Viruses
The greatest difficulty in getting millions of computers to work on a brute-force attack is convincing millions of computer owners to participate. You could ask politely, but thats time-consuming and they might say no. You could try breaking into their machines, but thats even more time-consuming and you might get arrested. You could also use a computer virus to spread the cracking program more efficiently over as many computers as possible.
This is a particularly insidious idea, first presented in [1593]. The attacker writes and lets loose a computer virus. This virus doesnt reformat the hard drive or delete files; it works on a brute-force cryptanalysis problem whenever the computer is idle. Various studies have shown that microcomputers are idle between 70 percent and 90 percent of the time, so the virus shouldnt have any trouble finding time to work on its task. If it is otherwise benign, it might even escape notice while it does its work.
Eventually, one machine will stumble on the correct key. At this point there are two ways of proceeding. First, the virus could spawn a different virus. It wouldnt do anything but reproduce and delete any copies of the cracking virus it finds but would contain the information about the correct key. This new virus would simply propagate through the computer world until it lands on the computer of the person who wrote the original virus.
A second, sneakier approach would be for the virus to display this message on the screen:
There is a serious bug in this computer. Please call 1-800-123-4567 and read the following 64-bit number to the operator: xxxx xxxx xxxx xxxx There is a $100 reward for the first person to report this bug.
How efficient is this attack? Assume the typical infected computer tries a thousand keys per second. This rate is far less than the computers maximum potential, because we assume it will be doing other things occasionally. Also assume that the typical virus infects 10 million machines. This virus can break a 56-bit key in 83 days and a 64-bit key in 58 years. You might have to bribe the antiviral software makers, but thats your problem. Any increase in computer speeds or the virus infection rate would, of course, make this attack more efficient.
The Chinese Lottery
The Chinese Lottery is an eclectic, but possible, suggestion for a massively parallel cryptanalysis machine [1278]. Imagine that a brute-force, million-test-per-second cracking chip was built into every radio and television sold. Each chip is programmed to test a different set of keys automatically upon receiving a plaintext/ciphertext pair over the airwaves. Every time the Chinese government wants to break a key, it broadcasts the data. All the radios and televisions in the country start chugging away. Eventually, the correct key will appear on someones display, somewhere in the country. The Chinese government pays a prize to that person; this makes sure that the result is reported promptly and properly, and also helps the sale of radios and televisions with the cracking chips.
If every man, woman, and child in China owns a radio or television, then the correct key to a 56-bit algorithm will appear in 61 seconds. If only 1 in 10 Chinese owns a radio or televisioncloser to realitythe correct key will appear in 10 minutes. The correct key for a 64-bit algorithm will appear in 4.3 hours43 hours if only 1 in 10 owns a radio or television.
Some modifications are required to make this attack practical. First, it would be easier to have each chip try random keys instead of a unique set of keys. This would make the attack about 39 percent slowernot much in light of the numbers were working with. Also, the Chinese Communist party would have to mandate that every person listen to or watch a certain show at a certain time, just to make sure that all of the radios and televisions are operating when the plaintext/ciphertext pair is broadcast. Finally, everyone would have to be instructed to call a Central-Party-Whatever-Its-Called if a key ever shows up on their screen, and then to read off the string of numbers appearing there.
Table 7.2 shows the effectiveness of the Chinese Lottery for different countries and different key lengths. China would clearly be in the best position to launch such an attack if they have to outfit every man, woman, and child with their own television or radio. The United States has fewer people but a lot more equipment per capita. The state of Wyoming could break a 56-bit key all by itself in less than a day.
Biotechnology
If biochips are possible, then it would be foolish not to use them as a distributed brute-force cryptanalysis tool. Consider a hypothetical animal, unfortunately called a DESosaur [1278]. It consists of biological cells capable of testing possible keys. The plaintext/ciphertext pair is broadcast to the cells via some optical channel (these cells are transparent, you see). Solutions are carried to the DESosaurs speech organ via special cells that travel through the animals circulatory system.
The typical dinosaur had about 1014 cells (excluding bacteria). If each of them can perform a million encryptions per second (granted, this is a big if), breaking a 56-bit key would take seven ten-thousandths of a second. Breaking a 64-bit key would take less than two tenths of a second. Breaking a 128-bit key would still take 1011 years, though.
Table 7.2 Brute-Force Cracking Estimates for Chinese Lottery | ||||
---|---|---|---|---|
Time to Break | ||||
Country | Population | # of Televisions/Radios | 56-bit | 64-bit |
China | 1,190,431,000 | 257,000,000 | 280 seconds | 20 hours |
U.S. | 260,714,000 | 739,000,000 | 97 seconds | 6.9 hours |
Iraq | 19,890,000 | 4,730,000 | 4.2 hours | 44 days |
Israel | 5,051,000 | 3,640,000 | 5.5 hours | 58 days |
Wyoming | 470,000 | 1,330,000 | 15 hours | 160 days |
Winnemucca, NV | 6,100 | 17,300 | 48 days | 34 years |
(All data is from the 1995 World Almanac and Book of Facts.) |
Another biological approach is to use genetically engineered cryptanalytic algae that are capable of performing brute-force attacks against cryptographic algorithms [1278]. These organisms would make it possible to construct a distributed machine with more processors because they could cover a larger area. The plaintext/ciphertext pair could be broadcast by satellite. If an organism found the result, it could induce the nearby cells to change color to communicate the solution back to the satellite.
Previous | Table of Contents | Next |