|Internet-based Distributed Computing Projects|
|News and Articles
Recently Completed Projects Past Projects
Tools Development Platforms Conferences Parody and Fun Sites Links Politics
Teams Books and Journals
|Active Distributed Computing Projects - Cryptography|
These links take you to other project categories on this site:|
Mathematics Art Puzzles/Games Miscellaneous Distributed Human Projects
Collaborative Knowledge Bases Charity
See the bottom of this page for a description of the icons on the page.
|Project Information||Project % Complete||Major Supported Platforms|
distributed.net organizes projects
like cracking data encryption
schemes (legally) and searching
for Optimal Golomb Rulers (measuring systems used in radio astronomy and
X-ray crystallography). The project completed its RC5-64 project on
September 25, 2002. The winning key was found after 1,726 days of work by
331,252 volunteers (and after 15,268,315,356,922,380,288 keys (82.8% of the
keyspace) were tested). The RC5-72 project began on December 3, 2002.
Currently the RC5-72, OGR-24 and OGR-25 projects are active.
Version 2.9001.477 of the client is available for most major platforms as of December 6, 2002. Pre-release version 2.9001.478 is available for many major platforms as of December 17 and 24, 2002. A pre-release version of the personal proxy server (build 332), is available for most platforms as of December 6, 2002. Note: client versions 2.8* or lower cannot participate in the RC5-72 contest. Also, if you are using the personal proxy server, you must use build 330 or higher with the 2.9001.* or higher clients. Finally, if you are upgrading from the 2.8* versions to a 2.9001.* or higher version of the client, please flush your output buffers before upgrading. The new versions use an incompatible buffer format.
See a log of an IRC discussion forum with some of the project coordinators which took place on September 28, 2002. They discussed the results of the RC5-64 project and future directions for distributed.net.
0.001% in 26 days
OGR-24: unknown (135,754,150 Gnodes checked in 899 days)
OGR-25: unknown (22,965,586,148 Gnodes checked in 879 days)
1 Gnode = 1 billion nodes
The NEO Project
uses the NEO-c (Network Exchange Operation for
Charity) platform to participate in various computing challenges and
projects, and donates any winnings to the charities specified by its users.
The volunteer whose computer finds the winning key for a challenge gets
10% of the prize money. The project's first challenge is the
RSA 576-bit factoring challenge. The project currently attempts to
solve the challenge through random guesses. In December, 2002, it will
implement a new algorithm which will use a new, distributed number sieving
method, and will be able to find the correct key within a predictable amount
of time. The project website is
The client is currently available for Windows. A beta client for Linux will be available in December, 2002. The client supports users behind firewalls, but not users behind proxy servers. It supports English, Dutch, German, French and Portuguese language users. It also has optimized code for AMD and Intel CPUs. Version 1.0.517 of the client is available as of December 3, 2002. See the fixes and enhancements for this and previous versions. If you would like to help Beta test future versions of the client, please join the "Beta Discussion" thread in the discussion forum.
The project also has an add-on tool, Neo Packet Analyzer (npa.zip), which lists the number of packets (work units) of each packet type in the client's offline.dat file. Version 1.0.101 of this tool is available as of November 5, 2002.
Join a discussion forum about the project.
30,732,388 packets completed; .121946115584E+15 keys checked
is a distributed, brute-force attempt to find the secret "backdoor"
password for Tivo's new version 3.2
software. This password allows a Tivo device owner to enable hidden
features in the software.
To participate in this project you can compile source code on Linux or you can download a pre-compiled binary for Windows. The client supports users behind proxy servers. Version 2.0f of the client is available for Windows and Linux as of December 11, 2002.
Version 1 of this project was known as Tivocrack. Version 2 became active around November 8, 2002. If you are still running the version 1 client, please switch to the version 2 client soon. 320,679 packets were completed for this project.
Read or join the discussion forum from which this project was created.
Disclaimer: Participation in the project may be illegal, and use of the password, if it is discovered, may damage your Tivo unit. Participate in this project at your own risk.
5 experiments completed;
experiment 6 is 50% complete
is a distributed effort to solve
challenge. The challenge offers a $10,000 (US) prize. The two
participants who find matching Distinguished Point values will each receive
$2,500 (US). The remaining $5,000 (US) will be split among the eCompute
ECC2-109 project developers.
The client currently does not support users behind firewalls/proxy servers, but it will in the future. You can upload points manually if you wish. The latest version of the Windows command-line/service client is available as of November 21, 2002. It supports multiple CPUs. If you are using an older version of the client, please upgrade as soon as possible. Note that your system must be MMX-capable to run the client. Windows GUI "wrappers," are available for the client (see below). Linux and Unix command-line clients (and a Linux wrapper) is available at FeLine's linux client code page. I have compiled a Solaris executable (48 KB) from the source code that you are welcome to use (you'll have to upload points manually, though). You may need to Shift-right click on the link and use the Save As dialog to save the executable. See the latest news about the project (last updated November 25, 2002).
Join a discussion forum about this project.
|The following icons may appear in the Supported Platforms section of the table:|