Distributed Computing Attacks on Cryptographic Systems

  • Authors:
  • A. P. L. Selkirk;A. E. Escott

  • Affiliations:
  • -;-

  • Venue:
  • BT Technology Journal
  • Year:
  • 1999

Quantified Score

Hi-index 0.00

Visualization

Abstract

It is now possible to link large numbers of desktop computers to achieve massive computing power. This paper briefly describes approaches taken to attack cryptographic algorithms using this method. The approach taken by BT Laboratories in the successful attack on an elliptic curve cipher is detailed. Finally a proposal for the architecture needed to recruit unused computing power for similar problems is given.