Cracking the code?

Marcos el Ruptor ruptor at cryptolib.com
Sat Mar 3 18:40:51 EST 2007


> My questions are: A) is this as vulnerable as it seems at first  
> blush? B) how many password/hex pairs would be needed to deduce the  
> underlying algorithm?, C) If one could deduce the algorithm, could  
> the attack be generalized so that it could be used against other  
> enterprises that use the same software? (It is very(!) widely  
> deployed), and D) am I missing something in my thinking?

A) yes it is vulnerable. B) none - it would take no time to reverse  
engineer the entire algorithm out of the executable. C) yes of  
course. D) just how bad this is.

Ruptor

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list