Jump to content

RSA Secret-Key Challenge: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
TobeBot (talk | contribs)
restored typo on year
 
(31 intermediate revisions by 24 users not shown)
Line 1: Line 1:
{{Short description|Cryptography contest}}
The '''RSA Secret-Key Challenge''' was a series of [[cryptographic]] contests that were started by [[RSA Laboratories]] on [[January 28]], [[1997]] with the intent of helping to demonstrate the relative security of different [[encryption algorithm]]s. The RSA Secret-Key Challenge is no longer active.<ref>RSA Laboratories[http://www.rsa.com/rsalabs/node.asp?id=2100 The RSA Laboratories Secret-Key Challenge]. Retrieved on 2007-05-18.</ref>
The '''RSA Secret-Key Challenge''' was a series of [[cryptographic]] contests organised by [[RSA Laboratories]] with the intent of helping to demonstrate the relative security of different [[encryption algorithm]]s. The challenge ran from 28 January 1997 until May 2007.<ref name="termination">{{cite web
| url = http://blogs.distributed.net/2007/05/21/04/34/bovine/
| title = <nowiki>bovine [21-May-2007 @ 04:34]</nowiki>
| first = Jeff
| last = Lawson
| date = 2007-05-21
| work = blogs.distributed.net
| accessdate = 2010-08-01
| quote = It is with great sadness that we must announce that RSA Labs has decided to terminate the RSA Secret-Key Challenge
}}</ref>


==Contest details==
==Contest details==

For each contest, RSA had posted on its website a block of ciphertext and the random [[initialization vector]] used for encryption. To win, a contestant would have had to break the code by finding the original plaintext and the [[cryptographic key]] that will generate the posted ciphertext from the plaintext. The challenge consisted of one [[Data Encryption Standard|DES]] contest and twelve contests based around the block cipher [[RC5]].
For each contest, RSA had posted on its website a block of ciphertext and the random [[initialization vector]] used for encryption. To win, a contestant would have had to break the code by finding the original plaintext and the [[cryptographic key]] that will generate the posted ciphertext from the plaintext. The challenge consisted of one [[Data Encryption Standard|DES]] contest and twelve contests based around the block cipher [[RC5]].


Each of the RC5-* contests is named after the variant of the [[RC5]] cipher used. The name ''RC5-w/r/b'' indicates that the cipher used ''w''-bit words, ''r'' rounds, and a key made up of ''b'' bytes. The contests are often referred to by the names of the corresponding distributed.net projects, for example RC5-32/12/9 is often known as RC5-72 due to the 72-bit key size.
Each of the RC5 contests is named after the variant of the [[RC5]] cipher used. The name ''RC5-w/r/b'' indicates that the cipher used ''w''-bit words, ''r'' rounds, and a key made up of ''b'' bytes. The contests are often referred to by the names of the corresponding distributed.net projects, for example RC5-32/12/9 is often known as RC5-72 due to the 72-bit key size.


The first contest was '''DES Challenge III''' (and was also part of the [[DES Challenges]]), and was completed in just 22 hours 15 minutes by distributed.net and the [[Electronic Frontier Foundation|EFF]]'s [[EFF DES cracker|Deep Crack]] machine.
The first contest was DES Challenge III (and was also part of the [[DES Challenges]]) and was completed in 22 hours 15 minutes by distributed.net and the [[Electronic Frontier Foundation|EFF]]'s [[EFF DES cracker|Deep Crack]] machine.

In May 2007 RSA Laboratories announced the termination of the challenge, stating that they would not disclose the solutions to the remaining contents, and nor would they confirm or reward prize money for future solutions.<ref name="termination" /> On 8 September 2008 [[distributed.net]] announced that they would fund a prize of $4000 for the RC5-32/12/9 contest.<ref>{{cite web
| url = http://blogs.distributed.net/2008/09/08/02/09/bovine/
| title = <nowiki>bovine [08-Sep-2008 @ 02:09]</nowiki>
| first = Jeff
| last = Lawson
| date = 2008-09-08
| work = blogs.distributed.net
| accessdate = 2010-08-01
| quote = Effective with this announcement, will officially fund the prize using the same distribution ratios that we would have originally used
}}</ref>


==Distributed.net==
==Distributed.net==
{{Main|Distributed.net}}
The contests are associated with the [[distributed.net]] group, which had actively participated in the challenge by making use of [[distributed computing]] to perform a [[brute force attack]].
The contests are associated with the [[distributed.net]] group, which had actively participated in the challenge by making use of [[distributed computing]] to perform a [[brute force attack]].


'''RC5-32/12/7''' was completed on [[19 October]] [[1997]], with distributed.net finding the winning key in 250 days and winning the US$10,000 prize. The recovered plaintext was: ''The unknown message is: It's time to move to a longer key length''.
RC5-32/12/7 was completed on 19 October 1997, with distributed.net finding the winning key in 250 days and winning the US$10,000 prize. The recovered plaintext was: ''The unknown message is: It's time to move to a longer key length''.


'''RC5-32/12/8''' also carried a US$10,000 prize and was completed by distributed.net on [[14 July]] [[2002]]. It took the group 1,757 days to locate the key, revealing the plaintext: ''The unknown message is: Some things are better left unread''.
RC5-32/12/8 also carried a US$10,000 prize and was completed by distributed.net on 14 July 2002. It took the group 1,757 days to locate the key, revealing the plaintext: ''The unknown message is: Some things are better left unread''.

There were still eight remaining contests that had not yet been solved, '''RC5/32/12/9''' through to '''RC5/32/12/16''', each of which was a US$10,000 prize. Distributed.net had been working on '''RC5-32/12/9''' and were over 0.681% through as of November 2009.


There were eight contests that had not yet been solved, RC5/32/12/9 through RC5/32/12/16, each of which was a US$10,000 prize. Distributed.net is working on RC5-32/12/9 and were at 12.298% as of July 13 2024 (7.559% as of March 22 2021, 6.700% as of 20 June 2020, 5.329% as of 18 September 2018, 4.356% as of 7 January 2017).<ref>{{Cite web|title=stats.distributed.net - RC5-72 Overall Project Stats|url=http://stats.distributed.net/projects.php?project_id=8|access-date=2020-06-21|website=stats.distributed.net}}</ref>
==See also==
==See also==
* [[RSA Factoring Challenge]]
* [[RSA Factoring Challenge]]

* [[DES Challenges]]
==References==
<references />


==External links==
==External links==
*[http://www.rsasecurity.com/rsalabs/node.asp?id=2100 Official contest page on the RSA website]
*[https://web.archive.org/web/20170417095446/http://www.emc.com/emc-plus/rsa-labs/historical/the-rsa-laboratories-secret-key-challenge.htm Official contest page on the RSA website]
*[http://www.rsasecurity.com/rsalabs/node.asp?id=2103 Current status of all contests within the challenge]
*[https://web.archive.org/web/20160320010029/http://www.emc.com/emc-plus/rsa-labs/historical/status-and-prizes.htm Current status of all contests within the challenge]
*[https://web.archive.org/web/20090720092702/http://www.rsa.com/rsalabs/node.asp?id=2106 Encrypted messages from contest]
*[http://distributed.net/rc5 Unofficial status page on Distributed.net]
*[http://distributed.net/RC5 Unofficial status page on Distributed.net]
*[http://stats.distributed.net/projects.php?project_id=8 Distributed.net's RC5-72 Project Statistics]
*[http://stats.distributed.net/projects.php?project_id=8 Distributed.net's RC5-72 Project Statistics]


==References==
<references />


[[Category:Cryptography contests]]
[[Category:Cryptography contests]]
[[Category:Recurring events established in 1997]]

[[Category:Recurring events disestablished in 2007]]
[[fr:Compétition de clé secrète RSA]]

Latest revision as of 20:26, 13 July 2024

The RSA Secret-Key Challenge was a series of cryptographic contests organised by RSA Laboratories with the intent of helping to demonstrate the relative security of different encryption algorithms. The challenge ran from 28 January 1997 until May 2007.[1]

Contest details

[edit]

For each contest, RSA had posted on its website a block of ciphertext and the random initialization vector used for encryption. To win, a contestant would have had to break the code by finding the original plaintext and the cryptographic key that will generate the posted ciphertext from the plaintext. The challenge consisted of one DES contest and twelve contests based around the block cipher RC5.

Each of the RC5 contests is named after the variant of the RC5 cipher used. The name RC5-w/r/b indicates that the cipher used w-bit words, r rounds, and a key made up of b bytes. The contests are often referred to by the names of the corresponding distributed.net projects, for example RC5-32/12/9 is often known as RC5-72 due to the 72-bit key size.

The first contest was DES Challenge III (and was also part of the DES Challenges) and was completed in 22 hours 15 minutes by distributed.net and the EFF's Deep Crack machine.

In May 2007 RSA Laboratories announced the termination of the challenge, stating that they would not disclose the solutions to the remaining contents, and nor would they confirm or reward prize money for future solutions.[1] On 8 September 2008 distributed.net announced that they would fund a prize of $4000 for the RC5-32/12/9 contest.[2]

Distributed.net

[edit]

The contests are associated with the distributed.net group, which had actively participated in the challenge by making use of distributed computing to perform a brute force attack.

RC5-32/12/7 was completed on 19 October 1997, with distributed.net finding the winning key in 250 days and winning the US$10,000 prize. The recovered plaintext was: The unknown message is: It's time to move to a longer key length.

RC5-32/12/8 also carried a US$10,000 prize and was completed by distributed.net on 14 July 2002. It took the group 1,757 days to locate the key, revealing the plaintext: The unknown message is: Some things are better left unread.

There were eight contests that had not yet been solved, RC5/32/12/9 through RC5/32/12/16, each of which was a US$10,000 prize. Distributed.net is working on RC5-32/12/9 and were at 12.298% as of July 13 2024 (7.559% as of March 22 2021, 6.700% as of 20 June 2020, 5.329% as of 18 September 2018, 4.356% as of 7 January 2017).[3]

See also

[edit]

References

[edit]
  1. ^ a b Lawson, Jeff (2007-05-21). "bovine [21-May-2007 @ 04:34]". blogs.distributed.net. Retrieved 2010-08-01. It is with great sadness that we must announce that RSA Labs has decided to terminate the RSA Secret-Key Challenge
  2. ^ Lawson, Jeff (2008-09-08). "bovine [08-Sep-2008 @ 02:09]". blogs.distributed.net. Retrieved 2010-08-01. Effective with this announcement, will officially fund the prize using the same distribution ratios that we would have originally used
  3. ^ "stats.distributed.net - RC5-72 Overall Project Stats". stats.distributed.net. Retrieved 2020-06-21.
[edit]