[1067] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Thoughts on the next target.

daemon@ATHENA.MIT.EDU (Marcus Leech)
Mon Jun 23 22:43:17 1997

From: "Marcus Leech" <mleech@nortel.ca>
To: dpj@world.std.com (David P. Jablon)
Date: Mon, 23 Jun 1997 21:59:54 -0500 (EDT)
Cc: cryptography@c2.net
In-Reply-To: <3.0.1.16.19970623190851.2caf76be@world.std.com> from "David P. Jablon" at Jun 23, 97 07:08:51 pm

> 
> Any of several widely-used challenge/response password
> systems make attractive targets.  A simple marriage
> of a dictionary cracker connected to a strategically-placed
> network sniffer, should produce an embarrasing flood of results.
> 
Many of these systems (CryptoCard, etc) use DES in one mode or another,
  and the ones that don't use DES use a proprietary hash function.

I think it's "splashier" to demonstrate weakness in widely publicized,
  and widely used (in the used-in-more-than-one-application sense)
  algorithms.

Brute-forcing the SecurID hash algorithm, for example would require
  that someone violate their license agreement with Security Dynamics/RSA.
  "Algorithm Thieves today showed that SecurID cards aren't as secure
   as manufacture claims".

-- 
----------------------------------------------------------------------
Marcus Leech                   Mail: Dept 8M86, MS 238, CAR
Systems Security Architect     Phone:    (ESN) 393-9145  +1 613 763 9145
Systems Security Services      Fax:      (ESN) 395-1407  +1 613 765 1407
Nortel Technology              mleech@nortel.ca
-----------------Expressed opinions are my own, not my employer's------

home help back first fref pref prev next nref lref last post