[1186] in cryptography@c2.net mail archive
Re: MS Access 'known database attack'
daemon@ATHENA.MIT.EDU (Sandy Sandfort)
Wed Jul 9 14:21:27 1997
Date: Wed, 9 Jul 1997 10:48:10 -0700 (PDT)
From: Sandy Sandfort <sandfort@crl.com>
To: Lucky Green <shamrock@netcom.com>
Cc: "Joshua E. Hill" <jehill@w6bhz.calpoly.edu>, cryptography@c2.net
In-Reply-To: <3.0.2.32.19970709084504.006dee88@netcom10.netcom.com>
On Wed, 9 Jul 1997, Lucky Green wrote with regard to an Access
Database breaker:
> You don't need or want a distributed crack. It just give the opponent
> ammunition. "It took how many computers?" Better do it at a lab and avoid
> disclosing the numbers of machines involved. No, this is a job for an
> individual.
I disagree in part. AFTER an individual has cracked the Access
Database, it would be great PR to distribute the cracking
program. By effectively killing Access Database, you point
out that those users and others need strong crypto.
S a n d y