Bugtraq mailing list archives
Re: Attack on DES paper and CRACK
From: rgm3 () is chrysler com (Robert Moskowitz)
Date: Thu, 19 Jan 1995 13:00:56 -0600
I want to thank everyone that helped me on these. I got it 'locally' over at Mich State U. Our security manager was so pleased with the information in it, that he intends in including the whole piece as an addendum to a security review paper for the auditors and senior management (rather than just referencing it). It was quite an eye opener for him, particularly the appendix on the chip desire for the DES search chip. :) I got CRACKERJACK, and once I did, I did not give it to the original requester, rather to our security people for a tool for them. Too dangerous, I can't trust that person to restrict who gets it. However, I was told:
I suspect that you don't really need CRACK for this but instead could simply use a script that checks the selected password's quality before it is encrypted, assuming that I read the application right. A perl script to do this is an extended example in the Perl book by Larry Wall. You can find the code for all the examples in the book on ftp.uu.net, and I believe there is a Perl available for PCs, so that would more or less handle the problem for you guys.
But the response on ftp.uu.net is terrible. I have not found these. Can anyone point me to another source of these? Robert Moskowitz Chrysler Corporation (810) 758-8212
Current thread:
- Re: Attack on DES paper and CRACK Robert Moskowitz (Jan 19)
- Re: Attack on DES paper and CRACK Karl Strickland (Jan 19)
- Re: Attack on DES paper and CRACK Julian Assange (Jan 19)
- <Possible follow-ups>
- Re: Attack on DES paper and CRACK Robert Moskowitz (Jan 20)