Cracking the code?

Marcos el Ruptor ruptor at
Sat Mar 3 18:40:51 EST 2007

> My questions are: A) is this as vulnerable as it seems at first  
> blush? B) how many password/hex pairs would be needed to deduce the  
> underlying algorithm?, C) If one could deduce the algorithm, could  
> the attack be generalized so that it could be used against other  
> enterprises that use the same software? (It is very(!) widely  
> deployed), and D) am I missing something in my thinking?

A) yes it is vulnerable. B) none - it would take no time to reverse  
engineer the entire algorithm out of the executable. C) yes of  
course. D) just how bad this is.


The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at

More information about the cryptography mailing list