Jump to content

RSA Secret-Key Challenge: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
External links: fixed link
restored typo on year
 
(20 intermediate revisions by 16 users not shown)
Line 1: Line 1:
{{Short description|Cryptography contest}}
The '''RSA Secret-Key Challenge''' consisted of a series of [[cryptographic]] contests organised by [[RSA Laboratories]] with the intent of helping to demonstrate the relative security of different [[encryption algorithm]]s. The challenge ran from 28 January 1997 until May 2007.<ref name="termination">{{cite web
The '''RSA Secret-Key Challenge''' was a series of [[cryptographic]] contests organised by [[RSA Laboratories]] with the intent of helping to demonstrate the relative security of different [[encryption algorithm]]s. The challenge ran from 28 January 1997 until May 2007.<ref name="termination">{{cite web
| url = http://blogs.distributed.net/2007/05/21/04/34/bovine/
| url = http://blogs.distributed.net/2007/05/21/04/34/bovine/
| title = <nowiki>bovine [21-May-2007 @ 04:34]</nowiki>
| title = <nowiki>bovine [21-May-2007 @ 04:34]</nowiki>
Line 7: Line 8:
| work = blogs.distributed.net
| work = blogs.distributed.net
| accessdate = 2010-08-01
| accessdate = 2010-08-01
| quote = It is with great sadness that we must announce that RSA Labs has
| quote = It is with great sadness that we must announce that RSA Labs has decided to terminate the RSA Secret-Key Challenge
decided to terminate the RSA Secret-Key Challenge
}}</ref>
}}</ref>


Line 15: Line 15:
For each contest, RSA had posted on its website a block of ciphertext and the random [[initialization vector]] used for encryption. To win, a contestant would have had to break the code by finding the original plaintext and the [[cryptographic key]] that will generate the posted ciphertext from the plaintext. The challenge consisted of one [[Data Encryption Standard|DES]] contest and twelve contests based around the block cipher [[RC5]].
For each contest, RSA had posted on its website a block of ciphertext and the random [[initialization vector]] used for encryption. To win, a contestant would have had to break the code by finding the original plaintext and the [[cryptographic key]] that will generate the posted ciphertext from the plaintext. The challenge consisted of one [[Data Encryption Standard|DES]] contest and twelve contests based around the block cipher [[RC5]].


Each of the RC5-* contests is named after the variant of the [[RC5]] cipher used. The name ''RC5-w/r/b'' indicates that the cipher used ''w''-bit words, ''r'' rounds, and a key made up of ''b'' bytes. The contests are often referred to by the names of the corresponding distributed.net projects, for example RC5-32/12/9 is often known as RC5-72 due to the 72-bit key size.
Each of the RC5 contests is named after the variant of the [[RC5]] cipher used. The name ''RC5-w/r/b'' indicates that the cipher used ''w''-bit words, ''r'' rounds, and a key made up of ''b'' bytes. The contests are often referred to by the names of the corresponding distributed.net projects, for example RC5-32/12/9 is often known as RC5-72 due to the 72-bit key size.


The first contest was '''DES Challenge III''' (and was also part of the [[DES Challenges]]), and was completed in just 22 hours 15 minutes by distributed.net and the [[Electronic Frontier Foundation|EFF]]'s [[EFF DES cracker|Deep Crack]] machine.
The first contest was DES Challenge III (and was also part of the [[DES Challenges]]) and was completed in 22 hours 15 minutes by distributed.net and the [[Electronic Frontier Foundation|EFF]]'s [[EFF DES cracker|Deep Crack]] machine.


In May 2007 RSA Laboratories announced the termination of the challenge, stating that they would not disclose the solutions to the remaining contents, and nor would they confirm or reward prize money for future solutions.<ref name="termination" /> On 8 September 2008 [[distributed.net]] announced that they would fund a prize of $4000 for the RC5-72 contest.<ref>{{cite web
In May 2007 RSA Laboratories announced the termination of the challenge, stating that they would not disclose the solutions to the remaining contents, and nor would they confirm or reward prize money for future solutions.<ref name="termination" /> On 8 September 2008 [[distributed.net]] announced that they would fund a prize of $4000 for the RC5-32/12/9 contest.<ref>{{cite web
| url = http://blogs.distributed.net/2008/09/08/02/09/bovine/
| url = http://blogs.distributed.net/2008/09/08/02/09/bovine/
| title = <nowiki>bovine [08-Sep-2008 @ 02:09]</nowiki>
| title = <nowiki>bovine [08-Sep-2008 @ 02:09]</nowiki>
Line 31: Line 31:


==Distributed.net==
==Distributed.net==
{{Main|Distributed.net}}

The contests are associated with the [[distributed.net]] group, which had actively participated in the challenge by making use of [[distributed computing]] to perform a [[brute force attack]].
The contests are associated with the [[distributed.net]] group, which had actively participated in the challenge by making use of [[distributed computing]] to perform a [[brute force attack]].


'''RC5-32/12/7''' was completed on 19 October 1997, with distributed.net finding the winning key in 250 days and winning the US$10,000 prize. The recovered plaintext was: ''The unknown message is: It's time to move to a longer key length''.
RC5-32/12/7 was completed on 19 October 1997, with distributed.net finding the winning key in 250 days and winning the US$10,000 prize. The recovered plaintext was: ''The unknown message is: It's time to move to a longer key length''.


'''RC5-32/12/8''' also carried a US$10,000 prize and was completed by distributed.net on 14 July 2002. It took the group 1,757 days to locate the key, revealing the plaintext: ''The unknown message is: Some things are better left unread''.
RC5-32/12/8 also carried a US$10,000 prize and was completed by distributed.net on 14 July 2002. It took the group 1,757 days to locate the key, revealing the plaintext: ''The unknown message is: Some things are better left unread''.

There were still eight remaining contests that had not yet been solved, '''RC5/32/12/9''' through to '''RC5/32/12/16''', each of which was a US$10,000 prize. Distributed.net had been working on '''RC5-32/12/9''' and were over 1.950% through as of October 27, 2011.


There were eight contests that had not yet been solved, RC5/32/12/9 through RC5/32/12/16, each of which was a US$10,000 prize. Distributed.net is working on RC5-32/12/9 and were at 12.298% as of July 13 2024 (7.559% as of March 22 2021, 6.700% as of 20 June 2020, 5.329% as of 18 September 2018, 4.356% as of 7 January 2017).<ref>{{Cite web|title=stats.distributed.net - RC5-72 Overall Project Stats|url=http://stats.distributed.net/projects.php?project_id=8|access-date=2020-06-21|website=stats.distributed.net}}</ref>
==See also==
==See also==

* [[RSA Factoring Challenge]]
* [[RSA Factoring Challenge]]

* [[DES Challenges]]
==References==
<references />


==External links==
==External links==
*[http://www.rsasecurity.com/rsalabs/node.asp?id=2100 Official contest page on the RSA website]
*[https://web.archive.org/web/20170417095446/http://www.emc.com/emc-plus/rsa-labs/historical/the-rsa-laboratories-secret-key-challenge.htm Official contest page on the RSA website]
*[http://www.rsasecurity.com/rsalabs/node.asp?id=2103 Current status of all contests within the challenge]
*[https://web.archive.org/web/20160320010029/http://www.emc.com/emc-plus/rsa-labs/historical/status-and-prizes.htm Current status of all contests within the challenge]
*[https://web.archive.org/web/20090720092702/http://www.rsa.com/rsalabs/node.asp?id=2106 Encrypted messages from contest]
*[http://distributed.net/RC5 Unofficial status page on Distributed.net]
*[http://distributed.net/RC5 Unofficial status page on Distributed.net]
*[http://stats.distributed.net/projects.php?project_id=8 Distributed.net's RC5-72 Project Statistics]
*[http://stats.distributed.net/projects.php?project_id=8 Distributed.net's RC5-72 Project Statistics]


==References==

<references />


[[Category:Cryptography contests]]
[[Category:Cryptography contests]]
[[Category:Uncracked codes and ciphers]]
[[Category:Recurring events established in 1997]]
[[Category:1997 establishments]]
[[Category:Recurring events disestablished in 2007]]
[[Category:2007 disestablishments]]

[[fr:Compétition de clé secrète RSA]]

Latest revision as of 20:26, 13 July 2024

The RSA Secret-Key Challenge was a series of cryptographic contests organised by RSA Laboratories with the intent of helping to demonstrate the relative security of different encryption algorithms. The challenge ran from 28 January 1997 until May 2007.[1]

Contest details

[edit]

For each contest, RSA had posted on its website a block of ciphertext and the random initialization vector used for encryption. To win, a contestant would have had to break the code by finding the original plaintext and the cryptographic key that will generate the posted ciphertext from the plaintext. The challenge consisted of one DES contest and twelve contests based around the block cipher RC5.

Each of the RC5 contests is named after the variant of the RC5 cipher used. The name RC5-w/r/b indicates that the cipher used w-bit words, r rounds, and a key made up of b bytes. The contests are often referred to by the names of the corresponding distributed.net projects, for example RC5-32/12/9 is often known as RC5-72 due to the 72-bit key size.

The first contest was DES Challenge III (and was also part of the DES Challenges) and was completed in 22 hours 15 minutes by distributed.net and the EFF's Deep Crack machine.

In May 2007 RSA Laboratories announced the termination of the challenge, stating that they would not disclose the solutions to the remaining contents, and nor would they confirm or reward prize money for future solutions.[1] On 8 September 2008 distributed.net announced that they would fund a prize of $4000 for the RC5-32/12/9 contest.[2]

Distributed.net

[edit]

The contests are associated with the distributed.net group, which had actively participated in the challenge by making use of distributed computing to perform a brute force attack.

RC5-32/12/7 was completed on 19 October 1997, with distributed.net finding the winning key in 250 days and winning the US$10,000 prize. The recovered plaintext was: The unknown message is: It's time to move to a longer key length.

RC5-32/12/8 also carried a US$10,000 prize and was completed by distributed.net on 14 July 2002. It took the group 1,757 days to locate the key, revealing the plaintext: The unknown message is: Some things are better left unread.

There were eight contests that had not yet been solved, RC5/32/12/9 through RC5/32/12/16, each of which was a US$10,000 prize. Distributed.net is working on RC5-32/12/9 and were at 12.298% as of July 13 2024 (7.559% as of March 22 2021, 6.700% as of 20 June 2020, 5.329% as of 18 September 2018, 4.356% as of 7 January 2017).[3]

See also

[edit]

References

[edit]
  1. ^ a b Lawson, Jeff (2007-05-21). "bovine [21-May-2007 @ 04:34]". blogs.distributed.net. Retrieved 2010-08-01. It is with great sadness that we must announce that RSA Labs has decided to terminate the RSA Secret-Key Challenge
  2. ^ Lawson, Jeff (2008-09-08). "bovine [08-Sep-2008 @ 02:09]". blogs.distributed.net. Retrieved 2010-08-01. Effective with this announcement, will officially fund the prize using the same distribution ratios that we would have originally used
  3. ^ "stats.distributed.net - RC5-72 Overall Project Stats". stats.distributed.net. Retrieved 2020-06-21.
[edit]