tu-wien
3.3.1 Existing Implementations Markus Diett [3] implemented a brute-force approach in software as well as in hardware. The software implementation could test approximately 784000 keys per second, which could iterate the entire 2 48 key space in approximately 4155 days. Note that these results are of course hardware specific, but unfortunately Diett did not elaborate on the testing system specifications. The hardware implementation on the Copacobana [6] could operate in two different frequencies (96 MHz and 108 MHz) with each of the 120 FPGAs testing a key in 4 clock cycles. This brings the rate of the hardware implementation to 2.88 ∗ 109 with 96 MHz and 3.24 ∗ 109 with 108MHz. The 2 48 key space could be searched in approximately 27.15 hours with 96 MHz and 24.13 hours with 108 MHz. There also exists another software based brute-force implementation called AYCWABTU [8] that is also based on the bit splice method as in the implementation of Diett [3]. It was implemented as a proof of concept that a brute-force attack on the DVB CSA is indeed possible. On a computer equipped with an Intel i5 3337U (1.80- 2.70 GHz) running on Debian 8, a rate of approximately 4000000 keys per second was achieved. The entire 2 48 key space could be iterated in approximately 814 days.
3.3.1 Existing Implementations
Markus Diett [3] implemented a brute-force approach in software as well as in hardware. The software
implementation could test approximately 784000 keys per second, which could iterate the entire 2
48 key space
in approximately 4155 days. Note that these results are of course hardware specific, but unfortunately Diett did
not elaborate on the testing system specifications. The hardware implementation on the Copacobana [6] could
operate in two different frequencies (96 MHz and 108 MHz) with each of the 120 FPGAs testing a key in 4 clock
cycles. This brings the rate of the hardware implementation to 2.88 ∗ 109 with 96 MHz and 3.24 ∗ 109 with 108
MHz. The 2
48 key space could be searched in approximately 27.15 hours with 96 MHz and 24.13 hours with
108 MHz.
There also exists another software based brute-force implementation called
AYCWABTU [8] that is also based
on the bit splice method as in the implementation of Diett [3]. It was implemented as a proof of concept that a
brute-force attack on the DVB CSA is indeed possible. On a computer equipped with an Intel i5 3337U (1.80-
2.70 GHz) running on Debian 8, a rate of approximately
4000000 keys per second was achieved. The entire 2
48
key space could be iterated in approximately 814 days.
Table 5.4: Worst case execution time of CUDABISS 2.5 for different GPUs.
GPU Brute-force Key Rate (k/s) Time to iterate 2
48 key space
NVidia GTX 570 166 ∗ 106 471h 1m
NVidia GTX 980 Ti 465 ∗ 106 168h 9m
this i posted twice-time.