[1077] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Thoughts on the next target.

daemon@ATHENA.MIT.EDU (ET)
Tue Jun 24 14:28:11 1997

From: "ET" <emergent@eval-apply.com>
To: <cryptography@c2.net>
Date: Tue, 24 Jun 1997 10:32:57 -0400

A somewhat popular police/public safety package encrypts over the
air transmissions with DES in ECB mode.  In addition, there is no
session key, and the DES key is hardwired into the executable.

 ----
From: Marcus Leech <mleech@nortel.ca>
To: David P. Jablon <dpj@world.std.com>
Cc: cryptography@c2.net
Date: Monday, 23 June, 1997 22:42
Subject: Re: Thoughts on the next target.

>
> Any of several widely-used challenge/response password
> systems make attractive targets.  A simple marriage
> of a dictionary cracker connected to a strategically-placed
> network sniffer, should produce an embarrasing flood of results.
>
Many of these systems (CryptoCard, etc) use DES in one mode or another,
  and the ones that don't use DES use a proprietary hash function.

I think it's "splashier" to demonstrate weakness in widely publicized,
  and widely used (in the used-in-more-than-one-application sense)
  algorithms.

Brute-forcing the SecurID hash algorithm, for example would require
  that someone violate their license agreement with Security Dynamics/RSA.
  "Algorithm Thieves today showed that SecurID cards aren't as secure
   as manufacture claims".

--
----------------------------------------------------------------------
Marcus Leech                   Mail: Dept 8M86, MS 238, CAR
Systems Security Architect     Phone:    (ESN) 393-9145  +1 613 763 9145
Systems Security Services      Fax:      (ESN) 395-1407  +1 613 765 1407
Nortel Technology              mleech@nortel.ca
-----------------Expressed opinions are my own, not my employer's------




home help back first fref pref prev next nref lref last post