Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security

Israelis Crack RSA 512 Bit in Microseconds 244

wojo writes "According to this story, the Israeli Weizmann Institute has broken RSA 512 bit encryption in, get this, 12uS (microseconds). And if that was not enough, it's handheld using a mix of quantum and optical computing technology. I need proof, how about you?" Hey, if it's in theThe Sunday Time (UK) it must be true, right?
This discussion has been archived. No new comments can be posted.

Israelis Crack RSA 512 Bit in Microseconds

Comments Filter:
  • by eries ( 71365 ) <slashdot-eric.sneakemail@com> on Sunday October 03, 1999 @09:21AM (#1642128) Homepage
    Good thing that only Americans are able to do things with cryptography. I mean, if we were allowed to export our expertise, those _foreigners_ would be able to... hey, wait a mintue...
  • by cduck ( 9999 )
    all i have to say is: 12usecs!?
  • All I can say is where's the quantum VDHL code.
  • by fcw ( 17221 )
    The Sunday Times also broke the 'Hitler Diaries' as a news story. We definitely need independent corroboration, plus an explanation of how this particular piece of kit might do its job in 12us.
  • It should be 12us, not 12uS. Seconds is designated with a small S.
  • Just when I've started rejoicing over being able to pay my bills via the Internet, we get this thrown at us....

    The only comfort is that it sounds expensive, so I don't think that we normal users of internet banking have anything to worry about yet... But the day I find a page on the net with the details of one of these devices, I'm gonna stop using internet banking..

    Which will be a shame, since it's so much easier to use internet banking than to go to your local branch office....

    -just my .02$
  • Maybe it runs the decryption algorithm in 12 microseconds, but I don't see how it would crack a 512 bit key in that amount of time.
  • We have a device that uses quantum computing to do its job. When they say that we don't have a quantum computer, they mean we don't have a general quantum computer. It's a similar situation to the one with the first mainframes, which were not programmable.
    ---
  • if you believe this I have the USS Enterprise parked in my garage, want it?
  • I wanna see hardware/software specs and some code.

    I *really* think this is a hoax of the highest order.

    But hey, that's just me.
  • This means they are able to factorize large prime numbers. If the principle they use is a general one, (not closely tied with the size of 512 bits), then this is very troubling news. However, I think this is a phony. Presented like this without reference to teqniques used (other than "quantum computing" and "optical computing" there is still no reason to worry. So what about my 2048 bit RSA key? Will they be able to crack that as well? They are welcome to try!
  • I am willing to bet that the London Times read about Adi Shamir's TWINKLE concept computer and somehow thought it had already been done.

    They tend to do that.
  • This may possibly be offsubject, and I don't know much about either, but could you use neural networks to crack Crypto?
  • The Weizmann institute says it has a device. Yet later in the article a member of the EIQC says that Quantum COmputers are still some ways off.

    I am guessing that this means the Weizmann Institute has designed a machine that theoretically could crack RSA 512 encryption IF AND WHEN it can be built.


  • by inburito ( 89603 ) on Sunday October 03, 1999 @09:34AM (#1642143)
    Now suppose that this is real.. and suppose that someone in israel has managed to put together quantum logic gates enough to crack 512bit encryption(last time I heard someone had a single nand-gate somewhat operational).. now the question being: why reveal it to the world?!? This is worth a lot of money as such.. Someone just leaked it out of the institute? Surely they understand the value of this. Why not sell it to nsa etc(or maybe they have it). They could decrypt most public key encryption at their will and now they go and announce it in SUNDAY TIMES of UK?
  • I guess that some of that magic cryptography dust must have fallen out of the 'States. After all, we all know that the only people capable of producing cryptography software (and cracking it) are in the United States, right?

    And here's where I breathe a long sigh of relief, because I use a 2048-bit DSA key in GnuPG. Even if it isn't true, I'm sure that the state-of-the-art in cracking techniques (such as those used by the US' No Such Agency) can crack RSA 512-bit in a very short time. Yes, I think I'll be using my long keys for a long while to come.

  • get that thing in with distributed.net! i wonder if i can get them to join my team... }:~)

    from what i understand though, rc5 is just static in its method, while pgp is more flexible. im wondering if this thing would stand a chance against pgp.

    begin shameless plug:
    btw, my team # 10133, smartasses online
    end shameless plug
  • by Rhys Dyfrgi ( 64793 ) on Sunday October 03, 1999 @09:37AM (#1642147)
    The way quantum computers work, it would take the same amount of time to crack 512 bits as it would to crack 56 bits, or any other value.

    See, quantum computers don't do things serially like standard computers. They perform their operations on the entire data set all at once. It doesn't matter if the data set has 1 item or 1 billion items, it takes the same amount of time.

    This is known as superposition. I don't know a terrible lot about the theory, but you can find out more at The Center for Quantum Computing [qubit.org]. This Quantum Computing Tutorial [weizmann.ac.il] is difficult to understand if you haven't done at least a little comp sci, and the one at qubit.org [qubit.org] is better for people who've never heard of quantum computing at all.
    ---
  • by Anonymous Coward
    This means they are able to factorize large prime numbers
    Shit! And some of use are still struggling with factorising small ones like 29....
  • from the astounding aspect of it all, that sounds like the best conclusion..
    then again, it's stuff like this that could be true, and due to the incredulity of it all, we don't take it seriously, and they go change all the rules on us while we're not looking because now they have the power to
  • yes.. if it runs the decryption algorithm once in 12 microseconds, it will have cracked the code. Quantum computing == solve all the possibilites at the same time. Now since the details of this are rather nonexistent and it is being reported by sunday times of uk i'd wait for little longer before stopping my internet transactions..
  • The problem is, they can break the codes that banks use to communicate with each other. They can break the codes ATMs use to communicate with the bank. You'd only be completely safe if your bank uses no electronics at all, just pencil and paper and a big metal vault.
    ---
  • A neural network is nothing more than a formalism for nonlinear curve fitting. It can't magically solve problems any faster than any other (conventional) technique.

    On the other hand, quantum computation, like biological computation, can solve a certain class of problems much faster than conventional computers.

    For example, quantum and factorization, biological and string matching.

    Noone that I am aware of has shown that quantum or biological computation can solve a general class of problems faster.
  • by chrystof ( 64036 ) on Sunday October 03, 1999 @09:41AM (#1642153)
    For all who want an explaination of what quantum computing is all about, point your browsers to http://cryptome.org/qc-grover.htm [cryptome.org] for a thorough explaination of how exactly such mammoth feats of computing are possible.
  • Go get a clue regarding prefixes. the u (it isn't really a u, it has a little thing before it like ",u" but joined, actually..) is short for micro.

    uS- microseconds

    uF- microfarads (most common) etc.

  • At that speed it should take more than a year to crack 554 bits keys, so 1024 bits keys should still be safe!

    (why isnt everyone using 1 meg keys anyway? :-))

    ---
  • The big question seems to be this: could it be true? Or are the Israelis just pulling Europe's chain?

    I say this: does it really matter? Since when has the presence of an actual threat over the presence of a perceived threat really meant much in international politics? If the Israelis can convince the world they can do it, without ever proving it, they've succeeded either way.

    Personally, I think that better encryption for banking systems is a good thing. I don't want anyone messing with my money, and as stated in a previous post, I like internet banking. So, regardless of whether or not this is a hoax, it's causing an increased notice of cryptography issues. The more people that are aware of security and crypto problems in computing, the better.

    Regardless, if it's not a hoax, imagine the implications of the quantum computing! Is it closer than we think?

  • by pridkett ( 2666 ) on Sunday October 03, 1999 @09:44AM (#1642157) Homepage Journal
    Yes this is a very interesting read. 12uSecs is damn impressive I have to hand it to them. Even more impressive if you read the "Thermodynamic Limitations" section of Applied Cryptography (see page 157 of the second edition) where he talks about how if you were to build a dyson sphere around the sun you could still only count up to 2^192. So to brute force computers need be made of something other than matter and occupy something other than space. (go read it)

    Anyway, lets look at something. Even with a 512 bit number, we can look at a 513 bit number and it should be twice as complex. A 520 bit number is 256 times as complex. It grows at a rate of 2^n. Which is basically useless from an algorithmic point of view, as most useful algorithms should be around n^k where K is a constant or some derivation thereof.

    Let me show something. I use a 2048 bit gnupg key (I'm paranoid okay?). This comes out to be 2^1536 times more complex. Thus (courtesy of my handy Ti-85 calculator) it should take about 2.892x10^457 seconds to factor. This comes out to be roughly 9.17x10^449 years.

    The only issues that come up are the following. What are the energy requirements for such a device. Do they grow linearly or exponentially? Also what with keyspace does it increase exponentially or linearly. If it is only a linear growth then yes my 2048 bit key is as good as swiss cheese against this and I better come up with a damn good one time pad system.

    I couldn't tell from the article, but it sounds as though part of this is based of Shamir's idea on how to factor 512 bit numbers. I seem to remember there was some mathematical oddity that allowed them to be easier for some reason. Can someone fill me in?
  • Hah! Didn't take very long for Need to Know to comment: http://www.ntk.net/ [ntk.net]
  • Searching this site [weizmann.ac.il] doesn't appear to reveal any papers/press releases relevant to the story. You would think if they had actually done it they would be yelling a bit louder, no?

  • The Weizmann Institute is one of the best research institutes in the world (think MIT-level). Shamir (inventor of Twinkle, co-inventor of RSA, co-inventor of differential cryptoanalysis, etc) worked (still works?) there, as does Eli Biham (differential analysis, related-key analysis, impossible differentials, and Serpent), Goldwasser, sereral others who are very presitious in the crypto community. If this were done anywhere in the world, it would probably be there.

    OTOH, I haven't been keeping up on the state of quantum computing research, so I don't know if something like this could be built. (I remember that several stories about Twinkle made it sound like it actually existed, while it's just a design).

    Given the general public's clue-lessness about crypto, I'd wait for some confirmation, preferably by the Weizmann Institue itself.

  • Ok first of all as i understand this "Quantum Computer" is actually some kind of optical computer that uses Quantum theory
    Second you ask why didnt they release it to the world or whatever? Dont you think that it would be mutch more usefull to the israeli military having people not know they could decrypt there messages?
    also aparently to an article i read somwhere the NSA etc only tell people that they can crack encryption 10-20 years after they figured out how to so this could be a long time comming and we only hearing about it now
    :))
  • Can anyone confirm this leak? The Times doesn't say who or where this leak came from, and the Weizmann Institute [weizmann.ac.il] doesn't seem to have any information on it, although they do have alot on RSA and public key crypto in general. And I would think any breakthrough like this would be kept under tight wraps, Israel isn't exactly the most open nation when it comes to spy and security stuff like this. Could be a red herring thrown out to make their enemies feel a bit more insecure. I'll believe it when I see it. Maybe.
    ^. .^
    ( @ )
    ^. .^
  • The "device" requirements for quantum cracking grows linearly. One more qubit == one more bit of encryption that can be cracked. At the same speed as before. So time is constant, space/energy grows linearly.

    Be very very worried, oh paranoid one.
    ---
  • No details, scary story, Vague references to cutting edge science.
  • they could have realized that they would get their butts handed to them, so they quit. the gov't is not one to want to take a slap to the face from suing an individual.
  • The article is very strange. Sometimes it speaks in past tense, as though the device has already been developed: "It claims it has developed a hand-held device that can break the code in 12 microseconds." While at other points it speaks as though the device has yet to, but will be developed: "While quantum computers may be some time off, when they are available no communication will be secure unless it is quantum."

    The article also confuses Quantum computing with Quantum Cryptography. The whole thing may just be the work of a confused journalist confusing a proposed, speculative design with something that has been built.
  • Actually you could treat earth as the center of the universe. All the calculations involved with tracking planetary objects would be complicated enormously but it is possible certainly.

    Guess I can't have that USS Enterprise then, huh?

  • I think his point was just amazement that it (supposedly) took a mere 12,us, not that he didn't understand prefixes.
  • London Times - Erk - it is available in the rest of the UK you know. We're not just one big city. Geographic politic aside I tend to take anything technology based that is printed in The Times with a large pinch of NaCl - they do not have the most rigorous checks in place when it comes to the quality of their IT journalism. For a weekly round up of the Times' PC faux pas' try reading Need To Know (www.ntk.net) the UK's cyber diatribe in one easy to swallow caplet (Not sugar coated does exactly what it says on the tin.) M@t :o)
  • by Gr00ve ( 30611 ) on Sunday October 03, 1999 @10:00AM (#1642176)
    They have got Adi Shamir's TWINKLE _concept_ confused with a finished product. NTK [ntk.net] took the piss out of this on Friday.

    This is a classic demonstration of how poor The Times has become. The paper as a whole and especially it's computer suppliment has been very factually challenged ever since Rupert Murdoch took over. He has attempted to make up for crappy quality with price cuts (20p for the paper some days [30cents]) and has so far failed.

    The Times is the worse broadsheet paper in the UK and the sooner American's realise this (no-flamage intended), the sooner we won't have joke stories like this on /.
  • Your 2048 or even 4096 bit key or any other type of key would not hold out against such a device. Quantum computer based crackers can break a 42 bit key as fast as a 512 bit key or even a 4096 bit key. They try all possible combinations in a massively parallel brute force approach.
  • by bjk4 ( 885 ) on Sunday October 03, 1999 @10:03AM (#1642178) Homepage
    The whole issue about adding-a-bit-doubles-the-cracking-time depends on three essential assumptions:

    1) Factoring products of primes is an NP problem
    2) That NP != P
    3) That we live in a P world

    One way to solve NP problems in linear time is to break assumption number 3. This is how they used DNA to solve a (rather short) travelling salesman problem by creating a parallel environment. Should quantum computing be used, we might be able to bring our computations into the NP realm, thus solving many complex problems. Kudo's to the person who actually does this though. I doubt the veracity of the article alot.

    -B
  • nope. quantum computers can crack a 4096 bit key as fast as a 512 bit key.
  • If thus stuff about quantum whatever turns out to be true, then in a few years, 2048 bits won't seem like a very big key.

    Are the algoritms and piece of software used for encryptions (PGP, RSA, etc.) able to trivially scale to an arbitrarily large # of bits? It might be a good idea to start thinking of 10,000 bit keys.

  • It's important to note that the sunday times is a very unreliable source of information. As well as serialising the Hitler diaries (which isn't quite so bad as they weren't the first or the only ones to be taken in) they've also ran various bizarre campaigns, such as insisting for a long time that AIDS wasn't caused by HIV.

    Their computer coverage is particularly bad. Their feature on the Tomlinson spy incident (where a list of MI6 spies was posted on the web) was so silly it was hard to read itwithout cracking up laughing. A friend bought that day's issue just so he could show it to people for amusement value.
  • by buhr ( 97820 ) on Sunday October 03, 1999 @10:06AM (#1642184)

    I haven't seen anyone point out the obvious red flag here.

    Suppose I am part of a crack research team, and we succeed in building the world's first, working quantum computer, one capable of almost unbelievable feats of brute-force code-breaking. Imagine our conversation:

    "Ladies and gentlemen, by God I think we've done it!" smiles the project coordinator. "Where do we go from here? Ideas, anyone?"

    "Publish!" cries a fresh, young intern. Having barely a handful of articles under his belt, he's eager to get his name on something like this.

    "Well, perhaps we should hold off, give the world time to prepare," suggests an older and wiser researcher. "This caliber of cipher is still in active use worldwide. It's protecting some pretty sensitive data." She pauses, then adds jokingly, "maybe we could sell it to the highest bidder." This is greeted by nervous laughter.

    Me, I'm looking at the mess of patch wires and tangled circuit boards. The machine must cover two desktops! "Why don't we turn it into a handheld device?" I suggest.

    The others are startled at first. But as they exchange looks, I see some nods and hear muttered agreement. This is the only logical course of action, and now we all know what must be done.

  • There are no easy answers as to whether this is real or not. On the one hand, it -does- sound like distilled oil of snake. On the other, this is the same institute that published in a number of reputable science journals a general method of cracking any-length keys (with the provision that the key was reused, and you had access to radioactive material and the encryption system).

    If they have deduced (either from their earlier work, or from new theorums) a fast and effective way of cracking keys, this could raise more than a few eyebrows. Depending on how general it was (the earlier published results applied to any algorithm with any key-length), this could mincemeat e-commerce and cause havoc with commercially sensitive Internet traffic.

    I -suspect- that it'll turn out that it's 12us PER KEY CHECKED, rather than to actually crack the code, UNLESS they've found an effective means of factorising primes. Given they need the "quantum computer" element, I suspect it's more the former. Even so, a massively parallel quantum computer testing keys in parallel would slice through keys like a hot knife. Given that nobody has built a "quantum computer" (at least, in the accepted sense), it seems likely this is a theoretical result, rather than an actual one.

    There is another possible translation, though - that the "quantum computer" stuff was an aside that the institute threw in and the journalist picked up on as central. Journalists tend not to let the facts get in the way of a good story. This suggests that there's a high-speed computer, capable of a high key-rate, in Israel. No great surprise, there. Hardly qualifies as news, unless it exploits some fundamental weakness in the algorithm or can factorise primes at a high rate.

  • We know the theory. But today? In a handheld device? right...

    -
    /. is like a steer's horns, a point here, a point there and a lot of bull in between.
  • Get a clue regarding the article...it was done in 12 *micro*seconds!
  • by Anonymous Coward
    It is true that Adi Shamir (The S in RSA)came up with the plans for a device called TWINKLE which could theoretically break 512 bit RSA keys. (1024+ bit keys are still infeasable for the device.) However, it should be pointed out that the device HAS NOT BEEN BUILT. In fact we looked over the plans at my University and decided it was probably impossible to actually work from a purely thermodynamic point of view (the number of LEDs clocked at 10GHz would create more heat than the old ENIAC/EDSAC era computers, but would be as small as a current machine... you would need truely Exotic Cooling to make such a device work. Also it should be noted that public key crypto and symmetric crypto are different, it takes more than one bit to double the break time for public key algos (6-10 bits depending on how you figgure it) Me.
  • This just does not feel like a believable claim.

    Firstly, it doesn't address just what is supposed to be "broken" in 12 microseconds. I'm not sure that one would be able to decrypt a message of meaningful size with the private key in that period of time.

    Secondly, there's a real mixture of "apparent reality" and "future fiction."

    It doesn't make sense for both of the following to be true:

    • "It claims it has developed a hand-held device that can break the code in 12 microseconds."
    • "While quantum computers may be some time off..."

    The one claim suggest that there is an actual implementation; the other suggests that implementation is still off in the future.

    Thirdly, it does not appear to address the consideration that a huge amount of the security of these systems come not simply in the "cool algorithms" being used, but from the careful use of protocols. Recognizing actual information within a message requires analysis of the protocol, and that's something that cryptanalysis does not, in and of itself, address.

    RSA-512 may not be of vast strength; the article still does not strike me as believable.

    (Aside: I was in a bookstore yesterday and saw Yet Another Book on Codes. Bible Codes, as it happens, but there has been, of late, an increase in the number of books on Real Crypto on bookstore shelves. I can generally evaluate the quality of the book by a 5 second riffle through the pages; if I don't notice large numbers of mathematical equations, I consider that the book is ludicrously worthless. In the case of Bible Codes, large numbers of equations would indicate Probably Serious But Still Worthless... )

  • by Anonymous Coward
    The idea behind how the system would work is still valid, and if anyone ever does manage to make one, all classical encryption will be pretty much screwed. The technique is called Shor's Algorithm, and it is the number 1 reason that everyone wants a quantum computer (IBM, the NSA, and alots of other countries would LOVE to have one.). Check out: For details on shor's algorithm [imsa.edu] or the book Explorations in Quantum Computing by William and Clearwater. If you built one you should be able to crack RSA about as fast as you could encrypt with it.
  • (i dont know anything about quantum computers or encryption but...)

    If you have enought "particles" you can crack any kind of encryption? Then, how can a quantum cryptography system be more secure? just curious, i m a lost here.. :-)

    ---
  • how about they do us a favor and crack rc5-64. just to prove that this thing acutally exists of coarse. And if this thing is real, is there any hope for encryption? is there some type of encryption that a quantum computer takes ages to crack?
    char *stupidsig = "this is my dumb sig";
  • > We have a device that uses quantum computing to
    > do its job.

    *We* have? Are you involved in this? Information please?

    Quantum computing, even in a limited form, is going to change the face of the 'net real fast. I know the theoretical work says it could be done this fast, but can these things actually be built already?

    The Matrix is going down for reboot now!
    Stopping reality: OK

  • If true, this would be a larger problem than you are implying, because it undercuts the whole notion of using crypto-based authentication and privacy within the banking system.

    The Internet is only the latest place where cryptographic systems are being used to implement security; DES has been used for years to secure ATMs, and the present availability of DES-cracking schemes establishes that that is undercut by available technologies.

    If "quantum computing" were to undercut Internet-based crypto schemes, it would undercut all of the presently constituted cryptographic distributed banking protocols, which would be Quite A Bad Thing, irrespective of your rejoicing or lack thereof...

  • by Anonymous Coward
    This is true. However in effect a quantum computer is composed of 2^n copies of itself, each copy in a different parallel universe, where n is the number of qubits. (I'm not kidding, read some David Deutsch.) So yes, your 2048 bit system is as good as swiss cheese, if the Israelis really do have a working quantum computer--but this would put them so far ahead of everyone else, it seems very unlikely.
  • by Coda ( 22101 ) on Sunday October 03, 1999 @10:29AM (#1642197) Homepage
    ... to this. Instead of speculating, let's look at the primary source:

    "After an Israeli research institute said it could break Europe's banking codes in less than a second, a initiative has been launched that could result in unbreakable codes."

    Notice the would "could." Not "did," not "has," but "could." This means it hasn't happened yet.

    "[Weizmann Institute] claims it has developed a hand-held device that can break the code in 12 microseconds."

    Again: claims to have developed a device. Not "cracked a huge RSA key in a completely scientific test."

    This offers no proof whatsoever, nor does it go into detail about what the "device" is, except to say that it uses a "mixture of quantum computing and special optical technology." Is this Twinkle? It being a full-fledged quantum computer would be *shocking*, since the most I've heard a quantum computer be able to handle is 5 qbits. Twinkle seems much more likely, and has less repercussions: the attack can't be extended to larger primes in the same amount of time.

    What about the RSA implementation? It would be fairly easy to crack an insecure implementation of RSA.

    Instead of rasing our blood pressue with speculation and conspiracy theories, let's wait until some facts come through. If this was really that important, it would be making waves in the crypto community instead of impressing /.ers.
  • Just run your encrypted text into a heisenberg compensator which is cross connected into a infinite improbability generator. After this the message still looks the same but the universe will have to be decrypted in order to read it.
    :)

  • Acutally uS would be micro siemans, micro seconds cubed amperes squared over meters squared kilograms, i.e. conductance.

    WTF would of course be watts * teslas * farads.

    Cheers -- ewd

    "Only entropy comes easy." -Lewis Mumford

  • by David Jao ( 2759 ) <djao@dominia.org> on Sunday October 03, 1999 @10:37AM (#1642202) Homepage
    I hate it when people confuse symmetric key cryptography with public key cryptography.

    You state that each extra bit in the key doubles the cracking time. That statement is true only if:

    • the key is a symmetric key,
    • brute force is used as the cracking method.
    When cracking public key cryptosystems, the first assumption is just completely wrong, and the second assumption is often not the case. In this particular case you are completely wrong -- the best known factoring algorithm is the number field sieve, with calculation time O(exp(c (log n)^(1/3) (log log n)^(2/3)). This running time is considerably below the 2^n time that you state.

    If you leave out the section stating that complexity doubles with each bit, then the rest of your post actually makes good sense.

  • thats what i'm sayin, over 700 days and no luck yet, crack RC5-64 in 1.5us and I'll believe...
  • grep Need To Know, 1st October 1999 [ntk.net] for quantum.

  • >Hardly qualifies as news, unless it exploits
    >some fundamental weakness in the algorithm or
    >can factorise primes at a high rate.

    Hell, if they can factorise primes at any rate, i'd say that constitutes a major breakthrough. Public Key cryptography relies on factoring large numbers, commonly the products of 2 primes. This is a possible task. Factoring a prime number is an impossible task.

  • Why do we all have the assumption that brute force is the only way to crack these large keys. Is it possible that they are not using brute force? And instead have devised some method of quickly determining the key _based on the encrypted data_?

    Or is that physically impossible....
  • so, working on the very shaky assumption that the Sunday Times isn't just talking out of their ass and this device could actually be created, how does this fare for Elliptic Encryption?

    How do you go about brute-forcing elliptic encryption, and is it similar to brute-forcing RSA? could this RSA-killing device be adapted to do EE?

    just curious. i have very little idea of how elliptic encryption works, or how it's broken. Can anyone explain for me?
  • by Anonymous Coward
    One of my profs demoed a NN which found the solution to a nontrivial travelling salesman graph in constant time. & of course all NP-complete problems can be transformed into any other (non P) NP problem. My jaw dropped about 12 useconds after my personal biological net linked these two thoughts. Granted, this net was brittle & may have crumbled vs. another TSP graph, but it wasn't useless.

    Since we haven't proven P!=NP, & encryption algorithms may hold intentional or unintentional backdoors that the Net may pick up on & train itself against, NNs may be useful after all. I remember reading in Applied Crypto that the NSA's tweaks to the DES algorithm resulted in much more linear transformations being applied. Smaller Nets can easily pick up on linearly separable data, & this was my 2nd flash of insight into thinking that the Crypto & NN communities ought to do lunch sometime.

    If you're really interested in this topic look into "Brain-state-in-a-box" nets. Warning: be prepared to think in n-dimensional space, where n is the number of bits in the key...

  • Apart from the very unlikely fact that the story holds any truth concerning code-breaking - What does the Sunday Times mean when saying "The European Banking System"??? There's more than a dozen of different national systems interconnecting various banks, there are networks between large banks across Europe, there's Eurocheque's network and and and... Get a clue, Sunday Times!!!
  • Hah! You can't fool me! I won't believe for a second that your garage is that big!
  • From the article...

    /BEGIN/
    The second aspect of Quantum computing, however, will help to make information more secure. Using a feature called "quantum entanglement", information could be sent between two computers that could not be eavesdropped upon without the two computers' knowledge. Because quantum physics dictates that monitoring a subatomic particle changes its state; not only would an eavesdropper announce his presence, but the message would be garbled.
    /END/

    As I read this, they are implying that this would be some kind of unbreakable One-Read-Only type of information stream. Anyone snooping the information would invariably change the information, and thus be instantly detected.
    Ok, so we break the Data Streem hard, and once we capture the incoming data, we then re-encode and spoof it to the intended receiver?

    "'A hacker wouldn't know where to start,' says Jonathan Curtis of Quantum Electronic Devices."

    I guess that means I'm not a hacker then. :)

    Nipok Nek
  • The point of having well-tested encryption algorithms is that they aren't supposed to have those weaknesses. Using a one-time-pad more than once can give a good cryptographer the method of finding your key (and thus your unencrypted messages) but for "normal", math-based encryption, this isn't supposed to be possible. If it was, we wouldn't be using things like RSA (which, btw, does have some known weaknesses, but hasn't been totally cracked), IDEA, etc.
  • How ironic:

    > Then it would either be debunked or denied. I very much doubt it exists....

    So are you the one who wisked away the team and reporter?


    --
    It's October 6th. Where's W2K? Over the horizon again, eh?
  • This is superluminal in a classical physics calculation. It would have to be a real small area the electrons and/or photons are interacting in since the speed of light is a limiting facter. If this isn't disinf then physics just changed for me.
  • The previous record for a privately held single machine on RSA 56 bit was 3 days with a 250,000$ machine. This comes out to, assuming technology is linearly scalable for money, 5.4e15$ (5,400,000,000,000,000$) (5.4 quadrillion dollars). Now, to scale this to 512 bit encryption, each extra bit is a power of 2 more possibilities, so this is 2^456 times the possibilies, resulting in a ~1e153$ machine (1,000,000,000,000,000,000,000,000,000,000,000,000 ,000,000,000,000,000,000,000,000,000,000 ,000,000,000,000,000,000,000,000,000,000,000,000,0 00,000,000,000,000,000,000,000,000,000,0 00,000,000,000,000,000,000$) (no name for this number)
    So, assuming they spent a billion dollars making this 1 chip, they're still getting a 1e144 times better buy on computing power than modern day computers. Excuse me while I cast "Disbelieve" on this article ;)
    Not to mention the physical impossibilities involved (such as, our favorite, the speed of light versus the smallest pathways we can make)

    Honestly, if we had a chip with a 144 orders of magnitude better performance than today's computers, there is no way it would only be mentioned in an article on encryption. There would be hundreds of companies competing for the rights; the net would be flooded with places trying to get this chip to the market. 144 orders of magnitude! a computer that costs a penny being more powerful than the most powerful supercomputers in the world! think about this.

    Don't believe what you read.

    - Rei
  • The sotry doesn't seem very believable. The most recent reports were of quantum computers able to factor the number 4. Although breakthroughs happen, I doubt that any breakthrough of this magnitude happened. It's sort of like someone suddenly building a pentium III when everyone else was building 8088 or m68ks. In addition the lack of details make the story pretty suspect.


  • I agree that these export regulations are silly. However, This israeli project is just theory thus far.
  • The Sunday Times is not very good at checking it's sources. This story looks impressive but there is no guarantee they have the remotest idea of what they are talking about.
    The 'Hitler Diaries' were a different case altogether, the decision to publish them was allegedly taken by Rupert Murdoch himself - even though they were considered possible forgeries.
    If they *were* faked, Lord Dacre could be - and was - blamed. Either way, it sold papers.
  • Firstly, it doesn't address just what is supposed to be "broken" in 12 microseconds. I'm not sure that one would be able to decrypt a message of meaningful size with the private key in that period of time.

    Nobody uses RSA to encode the message. Everybody uses RSA to encode a standard "symmetric" key. That decodes the actual message.

    The RSA challanges aren't even encoded messages. Just bunch of large numbers, that are a multiple of two primes. If you can factor those, you know you can crack RSA.

    Roger.

  • The relationship between the US gov't and the Israeli gov't isn't that black and white. Its more complex than that. I certainly wouldn't count on the Israelis to willingly share the technology with the US unless they NEEDED the US gov't to develop this thing.

    Also, according to the article this machine is just theory, a working model has yet to have been built. I wouldn't be the least bit suprised of US firms are well ahead of them.

    One thing many people fail to realize is that there is more money in the consumer market than there is government. So baring any government regulations preventing them from disclosing or patenting this technology, or cost issues (eg: such a machine can only be built for ~500K minimum); an astute person would approach the private sector first.
  • Factoring primes by trial-and-error is certainly possible. (Simply generate ALL primes up to sqrt(N), and divide by each prime in turn until you get an integer result, which can be verified as the second prime by looking for it on your list.)

    Factoring the product of two LARGE primes before the Universe decays into thermal radiation is slightly more complicated and requires either Orac (unless he's busy taking a close-up look at a Black Hole :), or an as-yet unknown (at least to the public) algorithm which can either generate primes faster than currently possible, or determine the factors directly, by some currently unknown means.

  • I have successfully been able to deduce primality using a simple backpropagation neural network. So, maybe factoring can be done...

    You can pick apart my paper at http://www.erols.com/mkatshym/Ex tendedEssay.ps.bz2 [erols.com].

    Michael Katz-Hyman
    mkatshym@erols.com
  • i meant, 'wtf!? they did it in only 12 MICROSECONDS!?' i didn't want to use 'us' becuase that just looks funny (regardless of being correct or not), 'uS' is wrong, and 'microseconds' is unnecessary. i figured that all of you could figure out what 'usecs' meant... -the author
  • If Intel had done that, it might have been taken for granted that your CPU has a serial number. Think of the possibilities (for big business, anyway)!
    --------
    "I already have all the latest software."
  • Not exactly. Essentially, a quantum computer of 8 bits can do an operation on all of the possible variations, i.e. 0->255. To expand this, a 56 bit quantum computer could go through all the variations of a 56 bit key in one pass.

    The real question is what sorts of lengths you can generate. Currently, I think they have constructed 5 bit quantum computers (anybody care to enlighten me?), but have yet to apporoach the 512 bit length needed for serious factorization.

    IIRC, the TWINKLE device they mentioned here is a *theorectical* device that generates numbers that have a good chance being prime factors of the RSA key in question. A real (a.k.a. normal) computer then checks these numbers in hopes of stumbling accross the solution.

    I think the Times has confused a paper with something that exists. After all, why would you tell banks you can crack their encryption when you could create some accounts for yourself? : )
  • They could have done better. If they didn't say it was in a handheld device it would be far more believable. If anyone is patient enough and willing to put the man hours (man decades) into arranging a quantum computer capable of doing it, I would expect it to be the US military or the Israelis. Just making the device would be an incredible challenge and accomplishment, even in a near absolute zero vacuum chamber where you could realistically manipulate single atoms. Putting it in to a handheld device is alien technology, it's startrek, it's not possible now.


    I would upgrade my 512bit keys to at least 1024 if not 2048bits but I wouldn't worry about this.

  • I meant we in the same sense as the previous poster did IIRC. I am not involved in this project.
    ---
  • 1)European Institute of Quantum Computing Network
    --Ever heard of them, no.
    --Here is the real info:
    The institute was founded a few weeks after news leaked from the Israel's Weizmann Institute that it was using a mixture of quantum computing and special optical technology to break the RSA-512 code, the system used by the European banking system. It claims it has developed a hand-held device that can break the code in 12 microseconds.

    2) Those of you on cryptography@c2.net know about Shamir.
    --Shamir (the S in RSA) theorized something called TWINKLE, the 'special optical technology' that the institute is referring to is very similar to TWINKLE.

    As Keith Dawson writes about the article in the times, "Is there any truth to this?" -- my answer, yeah, it is called recycled PR. :)
    -Davidu
  • You bastards!
    Beer recipe: free! #Source
    Cold pints: $2 #Product
  • by Anonymous Coward on Sunday October 03, 1999 @01:15PM (#1642244)
    agreed. reading over the article brings several glaring contradictions to light, especially the ending quote; the machine uses quantum technology, but the quote says quantum technology isn't feasible yet. so the journalist is clearly pretty incompetent in such affairs. a detailed look at the article makes this clear.

    (i) The device is handheld, but uses quantum computing.

    plainly bollocks; in order for the quantum state to preserved for any useable length of time WHATSOEVER would require huge amounts of cooling equipment. you're not going to get a handheld device which can cool things to a fraction above absolute zero.

    (ii) Holding a quantum state for 12uS, or even long enough to do something of use is sheer fantasy, at least by todays standards.

    (iii) If this story were true, it would announce two of the most fundamental breakthroughs in computer science and physics in recent memory; the Times ran this on the inside page of it's supplement, and it has languished there since the 29 September before anybody took notice of it, and then only slashdot. This is implausible, to put it mildly.

    (iv) We know about TWINKLE, and this is more than likely to be the machine in question. It does not make any use of quantum computing, at least according to the details we know.

    (v) "COULD break European banking codes in under a second"

    note the could. 12us defies belief... for RSA 512. make that RSA-40, though, and it seems perhaps plausible that TWINKLE could manage it in under a second (tho 12us still seems implausible). RSA-40 is the standard encryption used throughout europe for all e-commerce deals, including those used by customers dealing with on-line banks. things are starting to make some sense.

    (vi) secure quantum communication using entangled photons is nothing new; the research has been going on for some time. The hack probably got confused by this, leading to all the nonsense about breaking RSA.

    If it was true, we'd surely have heard more about it by now. it'd be BIG news.
  • WRONG. Do not pass go, do not collect $200, and do NOT moderate comments on the hypothesis they are relevant if you do not know for sure that they are.

    The contest you're thinking of is a very different one than attacks on RSA -- it is probably the RC5-56 factoring challenge, which was tackled early in the life of distributed.net. The algorithms are very different; RSA is public-key, or asymmetric, cryptography, while RC5 (like DES) is a private-key, or symmetric, algorithm. These are very different families of algorithms.

    Just as the algorithms are very different, key lengths simply can NOT be compared between the two. Most public-key cryptosystems rely on the difficulty of factoring large primes; private-key cryptosystems work on a variety of principles, but many current private-key cryptosystems are based on Feistel networks (for the curious, references in the literature are plentiful). In any case, private-key cryptosystems can generally use any integer as a key -- while a public-key system must select from a much sparser space (roughly, the set of primes; the integer n has approximately a 1 in n chance of being a prime).

    RSA-512 has been attacked and solved before (see http://www.rsasecurity.com/rsalabs/factoring/rsa15 5.html). This being said, I suspect those who think this is a misunderstanding (or misrepresentation) of TWINKLE are right; I cannot see any breakthrough making 512-bit keys factorable in less than a week (even on big iron, like that mentioned in the URL above) -- and even if they were factorable in that time, most cryptologists have already said that 512 bit public keys should not be considered secure for transactions today.
  • Symmetric doesn't technically have anything to do with it (you could brute force an asymmetric just as well). The main issue is that people are not using brute force guessing (which has running time 2^n even in assymmetric case) but are using factoring to break the cryptosystem (presumably). The complexity of factoring an n-bit number under the NFS as you point out, is order of exp( (ln(n))^(1/3) * (ln(ln(n)) ^(2/3)) so we plug in the results of a 512 bit number (which I believe was 0.012 seconds?) and obtain the constant. I calculate the constant to be about 7.6 * 10^-4, and thus plugging in 2048 into the above equation I get 0.018 secs more or less. I don't feel much safer with a 2048 bit key, do you?


    On another note, I would guess the article left out a small detail, the optical machine they were working on solved the second half of the seive, the half they used a Cray on in the earlier story. The pre calculations needed to setup the problem in terms the optical machine can handle took a few months of spare cpu cycles from some small amount of computers (under a 100 as i recall?). If they have discovered how to reduce that to near constant time then this would probably be the end of RSA type algorithms. There are still quite a few public key algorithms out there, so we might still have to wait for the quantum computers to come out before public key crypto is dead.

    Thanks for correcting that 2^n comment, it was might have misled alot of people.

    Caveats on this comment as well: complexity given above is ASYMPTOTIC. It has (logically) nothing whatsoever to do with any finite n, or set of n. It says nothing about them. Specifcally the running time says nothing about the relationship between 512bit and 2048bit factoring. However it is standard practice to assume that it does, and this practice (while not grounded in rigorous proof) tends to work out.
  • 1) Factoring products of primes is an NP problem

    It is. Given a proposed solution (i.e., a factorization) it is trivially verifiable in polynomial time, regardless of which of any number of reasonable modern computational models you wish to use.

    2) That NP != P

    Granted, since otherwise the problem is bounded by a polynomial.

    3) That we live in a P world

    How very technical of you. What is that supposed to mean?

    If what you are trying to arrive at are sufficient conditions for a lower-bound on the complexity of integer factorization you are likely wasting your time. If I remember correctly it is known that Factorization is in the intersection of NP and co-NP (someone correct me if I've forgotten), but it has not been shown NP-complete (and is thought not to be).

    But this says little about time required to solve (lower bounds) which are a more difficult matter all together. Depending upon your computational model it may be a trivial problem (consider the model where a machine can perform factorizations in one step -- then this is a constant-time problem). The point being that some magical computational system (here everyone reads "quantum computing", but it could be any magic-like technology -- and preferably less like vaporware in my opinion) or algorithmic revelation may reduce the problem quickly to tractability.

  • by coyote-san ( 38515 ) on Sunday October 03, 1999 @02:30PM (#1642262)
    The "Bible Code" isn't cryptography. Well, not cryptography by mere mortals.

    Anyway, the idea behind the Bible Code is that the first five books of the Bible were dictated to Moses by God, as tradition says. If you take every Nth character (skipping spaces?) you will get words scattered among the garble. That's standard statistics and nobody sees any significance in it.

    The "Bible Code" explores the shocking, *shocking*, discovery that if you look at *two* different periods you occasionally get words that intersect and are actually meaningful. E.g., you might see something like


    H
    K I L L S
    T
    L
    E U R O P E
    R

    Except it would actually look like a scrabble board. Why does /. always strip leading spaces, even when us silly posters use 'pre' tags? Anyway...

    Cue spooky music. The authors made a big point of the fact that they warned the late Israeli leader Rabin (?) that his name appeared with "assassinate", but the warnings were ignored. This is a "prediction" like that skeptics demand, right? Not really. The problems with the Bible Code are:

    1) there are often multiple hits on the same concept. BC supporters claim that it's proof of humanity's free will, but many of use are skeptical.

    2) there are a lot of garbage hits (e.g., something along the lines of "Hitler" and "peacemaker".) Oh yeah, that's free will again!

    3) the same algorithms applied to modern texts produce similar amazing hits. I remember one of the skeptic magazines discussed the amazing prophecies encoded in Moby Dick.

    In my view, one shared by many statisticians, the Bible Code is nothing more than proof that if you look hard enough you will eventually find a monkey wildly typing away at "Romeo and Julies". If you assume the first five books of the bible contain 2^16 symbols, then explore every pair of periods between 2 and 2^12 (so you'll get sentence of at least 16 characters), you'll have a sequence of (approximately)

    2^16 * (2^12) * (2^12)/ 2 = 2^39

    symbols, or on the order of one trillion symbols. No wonder it takes powerful computers weeks to find "meaningful" combinations. It's not because God hid His message well, it's that the message space is so huge.
  • Are you sure this is correct when you say

    "the best known factoring algorithm is the number field sieve, with calculation time O(exp(c (log n)^(1/3) (log log n)^(2/3))."

    For large n, (log log n)^(2/3) is less than (log n)^(2/3) so it seems as though

    c (log n)^(1/3) (log log n)^(2/3) is less than c (log n)^(1/3) * (log n)^(2/3) which is c log n.

    Hence exp(c (log n)^(1/3) (log log n)^(2/3)) is less than exp( c log n) = n^c. This implies factorization is polynomial.

    Am I missing something? Actually your parentheses aren't balanced so I may have misinterpreted by assuming a missing right paren at the end.

  • by edibleplastic ( 98111 ) on Sunday October 03, 1999 @06:39PM (#1642297)
    I was reading the postings about the encryption breakthrough and decided to actually check out the European Institute of Quantum Computing Network to see if it actually exists.

    Well, it actually exists [eiqc.org] and it actually was started last Monday. However, several things on the site itself point to the fact that quantum computing has not been developed that can crack RSA 512.

    The first bit of evidence is a quote that is on the front page of the site: "NASA are now planning on the basis that Quantum Computing will be mainstream within five years" --Dennis Bushill, Chief Scientist, Langley Research Centre of NASA

    Now if the organization was founded in response to the actual development of a quantum computer, I don't think that that quote would be up there. It would say something like "Quantum computing is a reality, and we need to do something NOW"

    Additionally, it seems to me that the Sunday Times got a lot of its information from the site's news section which mentions the TWINKLE project. The TWINKLE project says that 512 bit encryption could be cracked (meaning if this thing were ever to be developed), and I think that that is where the Times figured it could write After an Israeli research institute said it could break Europe's banking codes in less than a second

    After reading the site and rereading the article, it seems to me that the (mis?)information is a collection of three things.... a description of the *potential* power of a *to be built* quantum computer, a misread of the TWINKLE project, and a very creative interpretation of the European Institute of Quantum Computing's website.

    Actually, if you read the article with this in mind it never actually *says* that they have the device or the encryption has been cracked. The only thing that it explicitly says this is: "It claims it has developed a hand-held device that can break the code in 12 microseconds." which more than likely is a misinterpration on the reporter's part of something the Weizmann Instutite mentioned than actual fact.

    All in all, I think that the Sunday Times has done a horrible job of reporting this, and should be held responsible for the misinformation that they are spreading.


  • Ok first off, this is just a claim. One that is absolutely unverified. You tell me, why would they be so quiet about this thing? Why make a claim about being able to crack RSA, but not actually do it? Why crack RSA? There are so many larger things they could do which would garner more attention.

    Secondly, this is just a claim, a second hand one at that. They never even stated that they "HAVE" cracked RSA, they said they could.

    The word "could" can be interpreted many different ways. Could can be: They've created a working proof of concept, and this technology could crack RSA, they think, in X microseconds (2 billion dollars and 10 years later). And a few thousand variations thereof.

    This whole story, or atleast the way its being interpreted just doesn't compute. So I repeat, I'll believe it when I see it. Care to wager that they won't have a single 512bit RSA actually cracked within a year with this technology (let alone in X seconds)?

  • >One way to solve NP problems in linear time is to break assumption number 3. This is how they used DNA to solve a (rather short) travelling salesman problem by creating a parallel environment.

    The most interesting aspect to DNA computing is that it employs the physical/chemical properties of molecules to structure a problem solver.

    But the only real advantage is that these problem solvers are small and cheap, so you can apply a great many of them to the problem.

    The overall computation is still naive brute force. In fact, it's not even coordinated (across all the "computation units").

    The only reason it's of interest is simply because you can create such a lot of very small computers each trying one step of a brute force search...they still have to do (on the order of) the same number of steps as a program on a single processor machine.

    Now I don't care how small you think a molecule is, you'll need a bloody big test tube to search a 512-bit key space.

    Defining the significance of NP-complete problems to lay-people often involves showing them how for very small problem sets *there aren't enough atoms in the universe* to solve it.

    DNA computing has nothing what-so-ever to do with quantum computing.




  • In my view, one shared by many statisticians, the Bible Code is nothing more than proof that if you look hard enough you will eventually find a monkey wildly typing away at "Romeo and Julies".

    "'It was the best of times, it was the blurst of times?' Stupid monkey!"

    All roads lead to The Simpsons

  • It's no good. bad. Free kevin?! no, but really the crackers are good for the economy.
    Joseph Elwell.

The use of money is all the advantage there is to having money. -- B. Franklin

Working...