Custom hardware attack

The EFF's "Deep Crack" machine contained 1,856 custom chips and could brute force a DES key in a matter of days — the photo shows a circuit board fitted with 32 custom attack chips

In cryptography, a custom hardware attack uses specifically designed application-specific integrated circuits (ASIC) to decipher encrypted messages.

Mounting a cryptographic brute force attack requires a large number of similar computations: typically trying one key, checking if the resulting decryption gives a meaningful answer, and then trying the next key if it does not. Computers can perform these calculations at a rate of millions per second, and thousands of computers can be harnessed together in a distributed computing network. But the number of computations required on average grows exponentially with the size of the key, and for many problems standard computers are not fast enough. On the other hand, many cryptographic algorithms lend themselves to fast implementation in hardware, i.e. networks of logic circuits, also known as gates. Integrated circuits (ICs) are constructed of these gates and often can execute cryptographic algorithms hundreds of times faster than a general purpose computer.[1]

Each IC can contain large numbers of gates (hundreds of millions in 2005). Thus, the same decryption circuit, or cell, can be replicated thousands of times on one IC. The communications requirements for these ICs are very simple. Each must be initially loaded with a starting point in the key space and, in some situations, with a comparison test value (see known plaintext attack). Output consists of a signal that the IC has found an answer and the successful key.

Since ICs lend themselves to mass production, thousands or even millions of ICs can be applied to a single problem. The ICs themselves can be mounted in printed circuit boards. A standard board design can be used for different problems since the communication requirements for the chips are the same. Wafer-scale integration is another possibility. The primary limitations on this method are the cost of chip design, IC fabrication, floor space, electric power and thermal dissipation.[2]

  1. ^ Jindal, Poonam; Abou Houran, Mohamad; Goyal, Deepam; Choudhary, Anurag (2023-06-01). "A review of different techniques used to design photonic crystal-based logic gates". Optik. 280: 170794. Bibcode:2023Optik.280q0794J. doi:10.1016/j.ijleo.2023.170794. ISSN 0030-4026. S2CID 257725561.
  2. ^ Navaraj, William Taube; Gupta, Shoubhik; Lorenzelli, Leandro; Dahiya, Ravinder (April 2018). "Wafer Scale Transfer of Ultrathin Silicon Chips on Flexible Substrates for High Performance Bendable Systems". Advanced Electronic Materials. 4 (4): 1700277. doi:10.1002/aelm.201700277. S2CID 85547788.