[1088] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Thoughts on the next target.

daemon@ATHENA.MIT.EDU (David P. Jablon)
Wed Jun 25 12:10:38 1997

Date: Wed, 25 Jun 1997 09:44:50 -0400
To: "Marcus Leech" <mleech@nortel.ca>
From: "David P. Jablon" <dpj@world.std.com>
Cc: cryptography@c2.net
In-Reply-To: <199706242032.AA048404375@bftzh114.ott.bnr.ca>

Marcus,

To continue our debate over "newsworthy" targets ...

You wrote:
>Yup, but it [targeting a widely-used challenge/response password method]
> isn't something that's going to require a massively-parallel
>  brute-force attack, only a few-suitably motivated people--either
>  through session-hijacking (which is cryptographically uninteresting),
>  or a dictionary/"password cracking" attack against a single user.
>
>If we assume that the input key is eight characters consisting 
>  entirely of lowercase alphabetics, and we can test 35000/second on a 
>  "normal" machine, then the password is cracked in about a month on a single
>  system.

Why assume?  A massively parallel eavesdropper attack should
work against many apparently "good" passwords, when using a "bad"
method.  Maybe this is obvious to readers of cryptography@c2.net
but then again, I'm sure we all knew that DES-56 was
brute-forceable for the right price.

> This tells us nothing that we don't already know:  picking bad passwords
> weakens your system.  [ Surely, not "my" system? :-) ]

On the contrary, picking bad systems weakens your password.
A "bad" password for one system can be just fine for another.
Perhaps an eavesdropper crack of "2Jj3$dld" or a short pass-
phrase in a challenge/response system would be newsworthy to
some people.  It may also be surprising to some that "rover"
survives eavesdropper attack in a stronger system.

------------------------------------
David. Jablon
web: http://world.std.com/~dpj/
email: dpj@world.std.com


home help back first fref pref prev next nref lref last post