![]() |
![]() |
Attack Method | Known | Chosen | Storage Factor |
Work Factor |
Exhaustive precomputation | -- | 1 | 2^56 | 1 (table lookup) |
Exhaustive search | 1 | -- | Negligible | 2^55 |
Linear cryptanalysis | 2^43 (85%) | -- | For texts | 2^43 |
2^43 (10%) | -- | For texts | 2^50 | |
Differential cryptanalysis | -- | 2^47 | For texts | 2^47 |
2^55 | -- | For texts | 2^55 |
Threat | Budget | Technology | Time to break 40-bit DES |
Time to break 56-bit DES |
Hacker | Tiny | Scavenged time | 1 week | Infeasible |
Small Business | $10K | FPGA | 12 min | 556 days |
Corporation | $300K | FPGA or ASIC | 24 sec | 19 days |
Big Corporation | $10M | FPGA or ASIC | .7sec | 13 hours |
Government | $300M | ASIC | .0002 sec | 12 sec |
Ref: ICSA Guide to Cryptography, 1999; p. 211
For those of you interested in knowing the differences between DES-EBC and DES-CBC (with IV), I suggest you purchase the book "ICSA Guide to Cryptography" albiet a little out-dated or newer published Encryption material. As DES-EBC and CBC (with IV) have been around for some time, the book does not have to be that up-to-date to find the differences.
If you think about it, anybody who is willing to pay $300,000 to $10,000,000 probably can find a quicker and cheaper way to get that information via other means.