- News Home
6 March 2014 1:04 pm ,
Vol. 343 ,
Two studies show that eating a diet low in protein and high in carbohydrates is linked to a longer, healthier life, and...
Considered an icon of conservation science, researchers at World Wildlife Fund (WWF) headquarters in Washington, D.C.,...
The new atlas, which shows the distribution of important trace metals and other substances, is the first product of...
Early in April, the first of a fleet of environmental monitoring satellites will lift off from Europe's spaceport in...
Since 2000, U.S. government health research agencies have spent almost $1 billion on an effort to churn out thousands...
Magdalena Koziol, a former postdoc at Yale University, was the victim of scientific sabotage. Now, she is suing the...
Antiretroviral drugs can protect people from becoming infected by HIV. But so-called pre-exposure prophylaxis, or PrEP...
- 6 March 2014 1:04 pm , Vol. 343 , #6175
- About Us
Computer Jocks Crack Encryption Standard
22 October 1996 8:00 pm
Ensuring computer security has just become much harder. In a message on the Internet, Adi Shamir, an eminent cryptographer, has revealed a new way to crack the most popular schemes for encrypting messages passing over the Net and telephone lines.
Shamir, a mathematician at Israel's Weizmann Institute, is famous for helping to create a widely used encryption algorithm: RSA. (Shamir is the "S" in "RSA.") Now he and Eli Biham, a computer scientist also at Weizmann, have built on an attack strategy developed by researchers at Bellcore (to which RSA was vulnerable). ``They've taken it one step further,'' says Richard DeMillo, a member of the Bellcore group. The result, says Shamir, is an all-out assault on encryption systems. One prominent victim is the Data Encryption Standard (DES), in wide use throughout the computer world. Shamir and Biham were able to unravel DES's secret key after a mere 200 tries.
Shamir and Biham's approach, called differential fault analysis, relies upon making a computer err in its calculations. The first step is to irradiate an encrypting machine--a readily available encrypting chip, for example--to flip a bit in its memory. Then, by comparing a number of error-ridden encryptions with a single flawless one, the hacker can ferret out the key to ``almost any secret key cryptosystem proposed so far in the open literature,'' Shamir writes.