Cracking the code?
Marcos el Ruptor
ruptor at cryptolib.com
Sat Mar 3 18:40:51 EST 2007
> My questions are: A) is this as vulnerable as it seems at first
> blush? B) how many password/hex pairs would be needed to deduce the
> underlying algorithm?, C) If one could deduce the algorithm, could
> the attack be generalized so that it could be used against other
> enterprises that use the same software? (It is very(!) widely
> deployed), and D) am I missing something in my thinking?
A) yes it is vulnerable. B) none - it would take no time to reverse
engineer the entire algorithm out of the executable. C) yes of
course. D) just how bad this is.
Ruptor
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list