[1183] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: MS Access 'known database attack'

daemon@ATHENA.MIT.EDU (Lucky Green)
Wed Jul 9 13:15:11 1997

Date: Wed, 09 Jul 1997 08:45:04 -0700
To: "Joshua E. Hill" <jehill@w6bhz.calpoly.edu>
From: Lucky Green <shamrock@netcom.com>
Cc: cryptography@c2.net
In-Reply-To: <199707081911.MAA02958@mordor.boxes.org>

At 12:11 PM 7/8/97 -0700, Joshua E. Hill wrote:
>We could brute force the 32 bit key space, and then get the _one_
>key for all access databases.  I think it would be nice to distribute
>a small, easy to use Access Database breaker (with appropriate hoopla,
>etc). 

You don't need or want a distributed crack. It just give the opponent
ammunition. "It took how many computers?" Better do it at a lab and avoid
disclosing the numbers of machines involved. No, this is a job for an
individual.


--Lucky Green <shamrock@netcom.com>
  PGP encrypted mail preferred.
  DES is dead! Please join in breaking RC5-56.
  http://rc5.distributed.net/

home help back first fref pref prev next nref lref last post