[1187] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: MS Access 'known database attack'

daemon@ATHENA.MIT.EDU (Brian Haskin)
Wed Jul 9 14:53:48 1997

Date: Wed, 09 Jul 1997 13:58:10 -0400
From: Brian Haskin <haskin@ptway.com>
To: Lucky Green <shamrock@netcom.com>, cryptography@c2.net

Lucky Green wrote:
> 
> At 12:11 PM 7/8/97 -0700, Joshua E. Hill wrote:
> >We could brute force the 32 bit key space, and then get the _one_
> >key for all access databases.  I think it would be nice to distribute
> >a small, easy to use Access Database breaker (with appropriate hoopla,
> >etc).
> 
> You don't need or want a distributed crack. It just give the opponent
> ammunition. "It took how many computers?" Better do it at a lab and avoid
> disclosing the numbers of machines involved. No, this is a job for an
> individual.
> 
> --Lucky Green <shamrock@netcom.com>
>   PGP encrypted mail preferred.
>   DES is dead! Please join in breaking RC5-56.
>   http://rc5.distributed.net/

I think he meant to distribute a program that would instantly open any
access db, not a distributed crack on the key which certainly isn't
necessary.

Brian Haskin <haskin@ptway.com>

home help back first fref pref prev next nref lref last post