

Distributed.net releases CSC and OGR clients 92
NIVRAM writes "After six months of waiting, Distributed Net has finally released beta clients for CSC and OGR cracking. They can be found here. (Looks like 'a few weeks' took a bit longer, eh?). For those of you who don't know, distributed.net is a non-profit group which uses the power of many computers to crack large encryption algorythms such as RC5 and the U.S. Government's DES. "
Cool (Score:1)
Everyone: Quick! Download them now! (Score:1)
CSC and RC5 are at least real contests---OGR is nice, but I'll work towards the monetary goal, thanks.
-Chris
Re: clients (Score:1)
other contests? (Score:1)
What about rc5 (Score:1)
Re:other contests? (Score:2)
I use beta.dcti.org:2064... but there are some other non port 2064 ones listed.
Have fun and happy cracking.
NIVRAM
Re:Everyone: Quick! Download them now! (Score:1)
Re:What about rc5 (Score:1)
NIVRAM
Re:What about rc5 (Score:1)
Brute force only being one method though. Algorithm weakness is a different matter entirely.
Lucklily, even if we assume a 3 letter gov't group somehow has 10 or 100x the power of all the distributed.net computers and deepcrack, etc, you can still assume RC5-64 to be brute force safe.
Re:Uh huh (Score:2)
coincidence? (Score:1)
combo client (Score:2)
#define X(x,y) x##y
Distributed computing (Score:1)
I'm sure someone will come up with a new and cool use for Dist. Comp.
--krahd
Where's the source? (Score:1)
I don't trust programs that upload and download packets without my direct and complete control.
Unless they open the source, my paranoia will prevent me from participating.
OGR searching (Score:2)
It's nice to see more support/availability for the OGR project. IMVHO this is one of the most useful distributed projects around at the moment. While proving that you can crack RC5 might be fun, it doesn't have a real pay-off at the end, except for the small prize monies. The same goes for SETI@Home, which is a needle in a haystack search for something which may or may not exist.
Of course, OGR is probably also the least exciting to participate in for most people. At the finish of it you have something which is useful (to some people), but hardly greatly exciting for anyone outside of the field. On the other hand, producing a result confirming extra terrestrial life from the SETI@Home project would be interesting or exciting for almost everybody. This is probably the biggest reason (along with the differences in publicity) why more people support the less-likely-to-return-something-useful projects like SETI@Home over something like OGR or GIMPS.
Re:Everyone: Quick! Download them now! (Score:1)
keyproxy=beta.dcti.org
in the [parameters] section of your
Re:Distributed computing (Score:1)
The Internet Rendering Farm (Score:1)
RC5-64 is certainly not brute force safe (Score:2)
At this point you are banking on the fact that it still would cost a considerable amount of money to build a fast RC5-64 cracking device, probably between 1 and 100 million, and that the benefit of decrypting your transaction is much less than that. Since much more powerful codes exist, it seems silly to take that chance.
--
Re:coincidence? (Score:1)
good call
Terrific! (Score:1)
Why casino-21 is better... (Score:2)
Yes, OGR's actually have some practical use. However, they're only the optimal case of Golomb Rulers, and it's pretty easy to find near-optimal ones - only a couple percent off, at worst. Worse, for any given application, the number of marks that is desirable is bound to increase linearly. Any non-QC method of finding them will fall behind over time, even supercharged by Moore's law. (And the problem with the quantum solution is that it doesn't distribute. 2 128 bit QC's FullOn3d claims [fullon3d.com]. Also, until they have an algorithm that would spot the earth, the chances are miniscule.)
Then there's Casino 21 [rl.ac.uk]. Cooler graphics, actually useful. On the down side, it's vaporware (no pun intended) and it requires more serious hardware.
O=C=O O=C=O O=C=O O=C=O O=C=O O=C=O O=C=O O=C=O
But really, if any of this stuff gets you to leave the computer on overnight when you wouldn't otherwise, it's doing more harm than good.
O=C=O O=C=O O=C=O O=C=O O=C=O O=C=O O=C=O O=C=O
(although I'm kinda waiting for the day when you can use spare cycles to stress-test beta software. The only problem with that idea currently is that bad software will more often than not bring down your OS with it. At least, with most OS's
URI for client (Score:1)
The actual URI that you get to is: http://distributed.net/beta/
(I was going to post this as HTML, so I could make the real addy a hyperlink, but slashdot doesn't allow , and I didn't feel like quoting the interresting part of the first paragraph. curse you slashdot
#define X(x,y) x##y
Re:SETI@home ONLY (Score:1)
Only... we don't know what the needle looks like, where the haystack is, or what we'd do with the darn thing once we've found it!
Crack RC5-64! Why? Cause its there and begging for it and we'll know when we've found it!
later,
Ben.Scherrey@ga.lp.org
Ranked 8297th and climbing!
dcti.org? (Score:1)
maybe your OS (Score:1)
This is a directive to all /. linux/bsd/UNIX proponents (of which I am a member.): Do not start a big thread here. We all know that a Real Operating System will not be brought down by anything unless it is run by root.
to keep the raving masses happy, I will try to say what everybody will say. (gee, this is sounding really bad. I'm not trying to censor people, just to stop them wasting their time raving about Linux. sorry.)
Anyway, most operating systems use various schemes to stop random users from bringing down the machine. Most sensible OS designers see the ability to crash the system as a Bad Thing. Only the superuser should be able to do that, and even then only be explicitly using interfaces to the stuff that should be mucked with carefully. There are a couple of "modern" OSes which don't live up to this standard, but the majority of OSes don't crash easily from bad programs. The program goes down, but it cant touch the rest of the system. You should look into this sometime, if you find that your OS does let itself be crashed easily.
oh yeah, and tux rules, so does devil dude (whatever the BSD mascot is called).
If you are really concerned about not crashing, there are several things you could do. Most are well known and rational, but some aren't [satanic.org] :)
If I screwed up some here, then I won't be mad if you post more in this thread. Just this is not the place for _another_ OS flameout.
#define X(x,y) x##y
http://localhost/ (Score:1)
#define X(x,y) x##y
Re:What about rc5 (Score:1)
I would have to respectfully disagree. With a couple of notable exceptions, the distributed.net attack on RC5-64 (and before that, RC5-56) has been growing quite quickly. I remember participating in the RC5-56 contest when the estimated time to completion was in the decades. Moore's Law and a word-of-mouth spread of participants has caused it to rise dramatically. For an example, take a look at the distributed.net statistics at rc5stats.distributed.net [distributed.net] and compare the current keyrate against the average. It's more than double! Also note the "The odds are 1 in 1,680 that we will wrap this thing up in the next 24 hours." So that's 1 out of 5 years, but a simple doubling of computing power over 18 months means 1 out of 2.5 years, and another doubling 1 out of 1.25, etc., even if you don't count the keyspace exhausted while waiting for the doubling to happen. Add that to substantial growth in participants, and you have a solution in probably 2 years.
I know, it's a long time, but this is using completely idle cycles and general purpose hardware and volunteered programming and organizational ability. A full-time project with the funding and wherewithal to develop custom hardware (along the lines of EFF's "Deep Crack" machine for DES [see http://www.eff.org/descracker.html [eff.org]]) would be able to crack RC5-64 fairly easily. RC5-128, probably not.
Re:Cool (Score:1)
Maybe your point is that it is good to realize that rc5-64 is not all that strong. If that's what you mean, then you have a good point.
#define X(x,y) x##y
Re:combo client (Score:2)
When you have two processes running, A and B, then all processor registered are saved and restored when the OS switches from A to B and vice versa. Otherwise they would step on each others toes.
But maybe one could write a "virus" which infects non FP-using programs and lets fp calculations run during programs execution time?
Re:Free the source, Luke! (Score:1)
Where's the G4 version? (Score:1)
I'm still waiting for _any_ of these cracking clients (or preferably SETI) to start to support the G4's Velocity Engine. Sure, I'm running things pretty fast as they are, but still wouldn't mind an optimized client...
Re:Where's the source? (Score:1)
Open Source is the answer, just not to this question...
"I have no respect for a man who can only spell a word one way." - Mark Twain
Re:Free the source, Luke! (Score:1)
The client source is closes so that some clever programmer doesn't write a client that tells HIM what the winning key is first, allowing him to submit it to the RSA and walk off with the entire 10,000! This would NOT be good!
The CORE to the client IS open source - you can even compile it! If you want to know EXACTLY what your machine is doing, download the core source at http://www.distributed.net/source/ and check it out for yourself! While you're there, could you write a core for the K7? I've looked at it, but it's a tad beyond my meager programing skills.
Open Source IS the coolest thing since sliced bread to be sure, but it's NOT the answer to everything in the whole wide world. This is a clear exception to the "Open Source is Better" rule.
"I have no respect for a man who can only spell a word one way." - Mark Twain
Re: (Score:2)
Anyone have the details of CS-Cipher? (Score:2)
Words cannot describe my contempt and loathing for the unutterably rude people who hide information they should be making freely available behind registration forms, or JavaScript, or worse both. That their form doesn't even work just shows they're incompetent as well as stupidly unpleasant; the two often go together.
Anyway, so, anyone know a perfectly ordinary URL where a description can be found?
--
To avoid confusion (Score:1)
Re:Where's the source? (Score:1)
--
Re:Trying again (Score:1)
If any dcypher people are reading this: what's the reason behind this effort? D.net has a gazillion participants (well, some 50 000 active ones, at least), and will thus very likely find the correct key before any new effort (unless, of course, all those d.net participants continue to run RC5 instead of CSC). Not to mention that d.net already has released linux and freebsd clients, and d.net's clients are at least partially open source..
Re:combo client (Score:2)
Too bad there isn't a project which uses floating point. If there was, they could write a client that interleaves floating point with integer calculations to _use more of your computers brain at once_ :)
Many of the distributed.net cores already use a combination of "normal" and MMX instructions to achieve this effect. Unfortunately, the d.net mailing list archive doesn't appear to be searchable, but I did find some preliminary analysis of an Athlon core [distributed.net] which would derive similar benefits (read: chew through keys like a crazed wolverine on crack :-) ).
To "icing": your analysis of multiple-process issues isn't relevant here -- we're talking about a single execution thread, so there's no context switching. (What you said was true of course, but it just doesn't apply in this situation.)
Actually, no, we don't (Score:1)
As you can see from the public ledger [distributed.net], distributed net has donated almost US$20,000 to selected non-profits such as EFF [eff.org], FSF [fsf.org], and Project Gutenberg [promo.net].
What money we have retained has gone directly to supporting the network and buying necessary equipment, and not to staff.
Re:Where's the source? (Score:1)
If a company tries to sell a Slashdotter a closed-source encryption package, it doesn't get very far. The reader knows that if the package has holes that could be exploited by reading the source code, then the package has holes that can be exploited by reading a disassembly.
Why can't the /. readership apply the same logic to d.net as they apply to everything else? Is d.net somehow excempt?
If you couldn't be "confident in the return packets" if the full client source were released, then the only way you can be confident now is if you're deluding yourself.
I'll probably get flamed just like the last time I dared voice a negative opinion about d.net, but fuck it. If you're inconsistent while flaming me, the flames only make me stronger.
To prevent misunderstandings, let me state the nature of the holes I'm talking about. I'm not talking about running the d.net client compromising my security by it sending my passwd file to d.net or something like that. I'm talking about vulnerabilities that destroy our confidence in the results of the key tests.
Perhaps I just have the wrong take on the whole thing. I've been viewing d.net as an experiment and exercise in making trustworthy machines out of a mix of trustworthy and untrustworthy parts. But I believe this is one of the goals of the d.net project and that I'm not just pulling this out of my ass. It is not true that the d.net system is just a system for collecting a $10,000 prize and proving the need for longer keys to the US govt, whichever haphazard gum-and-shoestring method it takes.
I'm with grandma on this one: If you can't do it properly, you might as well not do it.
--
Re:SETI@home ONLY (Score:1)
I tried SETI but I just felt that it would never find anything. Right now I'm going with RC5 but I may well switch to OGR.
Specifically I think the criteria for a good project are:
That being said it's hard to find a good fit for these rules. OGR comes close but I think it lacks mass appeal.
Re:Trying again (Score:1)
Re:Distributed computing (Score:1)
Sure there is. Devote your idle cycles to SETI@Home [berkeley.edu] (Search for Extraterrestrial Intelligence).
It has been talked about numerous times in the past on
Personally, I do not belive that searching outer space is more productive than making it known to the powers that be that the current encryption algorithms are inadequate and should be replaced by something stronger -- like rc5.
-d9
Finally! (Score:1)
Why again a new Client? Better 1 for all... (Score:1)
Re:SETI@home ONLY (Score:1)
SETI are scanning a relatively limited frequency spectrum, which means that there might be a message out there and we are listening on the wrong station.
I am also waiting on a G4 RC5 client (along with my 2nd. processor for my Umax clone).
In related Distributed.net news, I sent in an email to DBaker telling him that they should get shirts from Copyleft.net (for more information on this, read his latest plan update). I, for one,emailed him about it, so don't fill up his mailbox.
Anyone else have problems with keys sent in Sunday/Monday? I sent in about 200 keys and got credit for 8 of them.
Anyway, enough random distributed thoughts.
(c) 1999 Hank Zimmerman
Re:SETI@home ONLY (Score:1)
Sorry, notice the smiley? (Score:1)
Re:Why again a new Client? Better 1 for all... (Score:1)
So if you haven't tried it out lately, I would suggest checking it out. If you have and you still don't like the client, I'm sorry. You are more than welcome to contribute to other contests and projects, after all it is your computer time, but I am sorry to see you go.
Thanks for the time that you have given so far.
Moose!
Re:Curious non-reporting (Score:1)
I find it curious that you didn't bother to name the project or provide a link to it. Is it the CSC one that's already been mentioned earlier, or another (possibly OGR)?
Re:Where's the source? (Score:1)
Actually, I'm surprised someone hasn't disassembled the buffer processing code, yet.
Re:combo client (Score:1)
matisse:~$ cat
Re:OGR searching (Score:1)
projects like SETI@Home over something like OGR or GIMPS."
finding extratresstrial life would be one of the most signifigant things every accomplished by mankind. Cracking a freaking code isn't nearly as signifigant. Now if they'd let us work on cracking the human genome, that'd be a little more important, but for me i'd rather search for aliens than find OGR. However because of the fact that the arecibo dish is overloaded, i am not helping(doing GIMPS). However if they ever get another dish i'd go back.
matisse:~$ cat
What about OGR? (Score:1)
OGR has practical applications.
And Seti@home has the cool benefit of potential contact with another species.
But yes, more applications would be nice.
Of course, the more out there, the less processing power each gets...
Re:RC5-64 is certainly not brute force safe (Score:1)
Second point, the time it takes to brute force something should be taken into consideration when encrypting the data in the first place. If you have data that only needs to be secure for a month before it's a moot point, then you can say RC5-64 is good enough.
Re:other contests? (Score:1)
Re:Curious non-reporting (Score:1)
NIVRAM
Re:www.dcypher.net for the 10th time (Score:1)
No, I don't help run D.net, I'm just one of the many thousands of users, and I like to voice my opinion.
NIVRAM
Re:combo client (Score:1)
Using the FPU in parallel is something that has been tossed around (along with a 'core' for video cards and printers), but no work has been done that I'm aware of.
Re:combo client (Score:1)
Re:Why again a new Client? Better 1 for all... (Score:1)
NIVRAM
Re:www.dcypher.net for the 10th time (Score:1)
NIVRAM
Re:RC5-64 is certainly not brute force safe (Score:2)
Unfortunately getting stronger crypto is not a function of Moore's law, since clearly "unbreakable" crypto with 128 bit symettric keys or 4096 bit public keys is well within the reach of modern CPUs. It is much more a function of inflexible legacy systems or protocols and assinine government regulation.
You make a good point that security is a time sensitive issue, but for me a few months is a not a good enough margin of safety for any crypto, since there is always the possibility that somebody is 10 times smarter, faster, or more determined than I thought they would be. A few months quickly becomes as few days or hours. I am much less worried where the theoretical margin of safety approaches the age of the universe. Since this is possible with modern crypto and large keys, I see no reason not to go the extra mile.
--