[1181] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: MS Access 'known database attack'

daemon@ATHENA.MIT.EDU (Frank (Giff) Gifford)
Wed Jul 9 12:46:41 1997

Date: Tue, 8 Jul 1997 14:58:29 -0400 (EDT)
From: "Frank (Giff) Gifford" <giff@va.pubnix.com>
To: cryptography@c2.net

Repeated with permission...


On Tue, 8 Jul 1997, Mark D. Fisher [fish@nowhere.net] wrote:

> 
> Ineresting.....By the way: according to what you say and what the included
> article says, it would seem to me that the key stream should cycle every
> 2048 bytes.  Does it?  If so it becomes even more trivial to break the 
> encryption:
> 
> (1) read in the db 2k at a time
> (2) XOR with the 2k constant (1st 2k of key stream)
> 
> I suspect the executable to do this would not be much bigger than 2k :-)
> 
> -Mark
> 

No.  Each 2K block is encrypted with a different key (my guess is that 
it's the block number).  So the stream you get is different for each 
block.

When I was checking this some time ago the hard way (looking only at 
encrypting known databases without any knowledge of the underlying 
system), I determined that it was a stream XOR cipher.  The stream 
didn't repeat and the simple tests I tried on reconstructing the key 
stream were unsuccessful.  But knowing that it's RC4 explains much about 
the encryption behavior.

This is where a poor implementation of encryption can give people a false 
sense of security.

-Giff



home help back first fref pref prev next nref lref last post