HOME

TheInfoList



OR:

Distributed.net is a
volunteer computing Volunteer computing is a type of distributed computing in which people donate their computers' unused resources to a research-oriented project, and sometimes in exchange for credit points. The fundamental idea behind it is that a modern desktop co ...
effort that is attempting to solve large scale problems using otherwise idle CPU or
GPU A graphics processing unit (GPU) is a specialized electronic circuit designed to manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. GPUs are used in embedded systems, mo ...
time. It is governed by Distributed Computing Technologies, Incorporated (DCTI), a
non-profit organization A nonprofit organization (NPO) or non-profit organisation, also known as a non-business entity, not-for-profit organization, or nonprofit institution, is a legal entity organized and operated for a collective, public or social benefit, in co ...
under U.S. tax code
501(c)(3) A 501(c)(3) organization is a United States corporation, trust, unincorporated association or other type of organization exempt from federal income tax under section 501(c)(3) of Title 26 of the United States Code. It is one of the 29 types of ...
. Distributed.net is working on
RC5 In cryptography, RC5 is a symmetric-key block cipher notable for its simplicity. Designed by Ronald Rivest in 1994, ''RC'' stands for "Rivest Cipher", or alternatively, "Ron's Code" (compare RC2 and RC4). The Advanced Encryption Standard (AES) ...
-72 (breaking RC5 with a 72-bit key), The RC5-72 project is on pace to exhaust the keyspace in just under 47 years, although the project will end whenever the required key is found. RC5 has eight unsolved challenges from
RSA Security RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company with a focus on encryption and encryption standards. RSA was named after the initials of its co-founders, Ron Rivest, ...
, although in May 2007, RSA Security announced that they would no longer be providing prize money for a correct key to any of their secret key challenges. distributed.net has decided to sponsor the original prize offer for finding the key as a result. In 2001, distributed.net was estimated to have a
throughput Network throughput (or just throughput, when in context) refers to the rate of message delivery over a communication channel, such as Ethernet or packet radio, in a communication network. The data that these messages contain may be delivered ov ...
of over 30
TFLOPS In computing, floating point operations per second (FLOPS, flops or flop/s) is a measure of computer performance, useful in fields of scientific computations that require floating-point calculations. For such cases, it is a more accurate meas ...
. , the throughput was estimated to be the same as a Cray XC40, as used in the Lonestar 5 supercomputer, or around 1.25 petaFLOPs.


History

A coordinated effort was started in February 1997 by Earle Ady and Christopher G. Stach II of Hotjobs.com and New Media Labs, as an effort to break the RC5-56 portion of the RSA Secret-Key Challenge, a 56- bit
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
algorithm that had a $10,000
USD The United States dollar (symbol: $; code: USD; also abbreviated US$ or U.S. Dollar, to distinguish it from other dollar-denominated currencies; referred to as the dollar, U.S. dollar, American dollar, or colloquially buck) is the official ...
prize available to anyone who could find the key. Unfortunately, this initial effort had to be suspended as the result of
SYN flood A SYN flood is a form of denial-of-service attack in which an attacker rapidly initiates a connection to a server without finalizing the connection. The server has to spend resources waiting for half-opened connections, which can consume enough ...
attacks by participants upon the server. A new independent effort, named distributed.net, was coordinated by Jeffrey A. Lawson, Adam L. Beberg, and David C. McNett along with several others who would serve on the board and operate infrastructure. By late March 1997 new proxies were released to resume RC5-56 and work began on enhanced clients. A cow head was selected as the icon of the application and the project's mascot. The RC5-56 challenge was solved on October 19, 1997 after 250 days. The correct key was "0x532B744CC20999" and the plaintext message read "The unknown message is: It's time to move to a longer key length". The RC5-64 challenge was solved on July 14, 2002 after 1,757 days. The correct key was "0x63DE7DC154F4D039" and the plaintext message read "The unknown message is: Some things are better left unread". The search for OGRs of order 24, 25, 26, 27 and 28 were completed by distributed.net on 13 October 2004, 25 October 2008, 24 February 2009, 19 February 2014, and 23 November 2022 respectively.


Client

"DNETC" is the file name of the software application which users run to participate in any active distributed.net project. It is a command line program with an interface to configure it, available for a wide variety of platforms. distributed.net refers to the software application simply as the "client". , volunteers running 32-bit Windows with ATI/AMD Stream enabled GPUs have contributed the most processing power to the RC5-72 project and volunteers running 64-bit Linux have contributed the most processing power to the OGR-28 project. Portions of the source code for the client are publicly available, although users are not permitted to distribute modified versions themselves. Distributed.net's RC5-72 project is available on the
BOINC The Berkeley Open Infrastructure for Network Computing (BOINC, pronounced – rhymes with "oink") is an open-source middleware system for volunteer computing (a type of distributed computing). Developed originally to support SETI@home, it beca ...
client through the Moo! Wrapper.


Development of GPU-enabled clients

In recent years, most of the work on the RC5-72 project has been submitted by clients that run on the
GPU A graphics processing unit (GPU) is a specialized electronic circuit designed to manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. GPUs are used in embedded systems, mo ...
of modern
graphics cards A graphics card (also called a video card, display card, graphics adapter, VGA card/VGA, video adapter, display adapter, or mistakenly GPU) is an expansion card which generates a feed of output images to a display device, such as a computer moni ...
. Although the project had already been underway for almost 6 years when the first GPUs began submitting results, as of March 2018, GPUs represent 78% of all completed work units, and complete nearly 93% of all work units each day. *NVIDIA :In late 2007, work began on the implementation of new RC5-72 cores designed to run on
NVIDIA Nvidia CorporationOfficially written as NVIDIA and stylized in its logo as VIDIA with the lowercase "n" the same height as the uppercase "VIDIA"; formerly stylized as VIDIA with a large italicized lowercase "n" on products from the mid 1990s to ...
CUDA-enabled hardware, with the first completed work units reported in November 2008. On high-end NVIDIA video cards at the time, upwards of 600 million keys/second was observed For comparison, a 2008-era high-end single
CPU A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and ...
working on RC5-72 achieved about 50 million keys/second, representing a very significant advancement for RC5-72. As of January 2020, CUDA clients have completed roughly 10% of all work on the RC5-72 project. *ATI :Similarly, near the end of 2008, work began on the implementation of new RC5-72 cores designed to run on ATI Stream-enabled hardware. Some of the products in the Radeon HD 5000 and 6000 series provided key rates in excess of 1.8 billion keys/second. As of January 2020, Stream clients have completed roughly 43% of all work on the RC5-72 project. *OpenCL :An OpenCL client entered beta testing in late 2012 and was released in 2013. As of January 2020, OpenCL clients have completed about 27% of all work on the RC5-72 project. No breakdown of OpenCL production by GPU manufacturer exists, as AMD, NVIDIA, and Intel GPUs all support OpenCL.


Timeline of distributed.net projects

; Current * RSA Lab's 72-bit RC5 Encryption Challenge — ''In progress'', 9.232% complete as of 8 Nov 2022 (although RSA Labs has discontinued sponsorship) ; Cryptography * RSA Lab's 56-bit RC5 Encryption Challenge — ''Completed 19 October 1997'' (after 250 days and 47% of the key space tested). * RSA Lab's 56-bit DES-II-1 Encryption Challenge — ''Completed 23 February 1998'' (after 39 days) * RSA Lab's 56-bit DES-II-2 Encryption Challenge — ''Ended 15 July 1998'' (found independently by the
EFF DES cracker In cryptography, the EFF DES cracker (nicknamed "Deep Crack") is a machine built by the Electronic Frontier Foundation (EFF) in 1998, to perform a brute force search of the Data Encryption Standard (DES) cipher's key space – that is, to dec ...
after 2.5 days) * RSA Lab's 56-bit DES-III Encryption Challenge — ''Completed 19 January 1999'' (after 22.5 hours with the help of the EFF DES cracker) * CS-Cipher Challenge — ''Completed 16 January 2000'' (after 60 days and 98% of the key space tested). * RSA Lab's 64-bit RC5 Encryption Challenge — ''Completed 14 July 2002'' (after days and 83% of the key space tested). ; Golomb rulers * Optimal Golomb Rulers (OGR-24) — ''Completed 13 October 2004'' (after days, confirmed predicted best ruler) * Optimal Golomb Rulers (OGR-25) — ''Completed 24 October 2008'' (after days, confirmed predicted best ruler) * Optimal Golomb Rulers (OGR-26) — ''Completed 24 February 2009'' (after days, confirmed predicted best ruler) * Optimal Golomb Rulers (OGR-27) — ''Completed 19 February 2014'' (after days, confirmed predicted best ruler) * Optimal Golomb Rulers (OGR-28) — ''Completed 23 November 2022'' (after days, confirmed predicted best ruler)


See also

* RSA Secret-Key Challenge * Golomb Ruler *
DES Challenges The DES Challenges were a series of brute force attack contests created by RSA Security to highlight the lack of security provided by the Data Encryption Standard. The Contests The first challenge began in 1997 and was solved in 96 days by the ...
*
Brute force attack In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct ...
*
Cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
*
Key size In cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the faste ...
*
List of volunteer computing projects This is a comprehensive list of volunteer computing projects; a type of distributed computing where volunteers donate computing time to specific causes. The donated computing power comes from idle CPUs and GPUs in personal computers, video game co ...
* Berkeley Open Infrastructure for Network Computing


References


External links


Official website
{{DEFAULTSORT:Distributed.Net Cryptographic attacks Volunteer computing projects Charities based in the United States Organizations established in 1997 Articles which contain graphical timelines