> -----Original Message-----
> From: Ishikawa [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, July 12, 2001 11:50 AM

>From the discussion, I think some readers missed
> the point of the original poster.
> Using "||" as string concatination operator, it seems that
> 
>     MD5 (given-long-string || short-password-candidate )
> 
> can now be brute forced to produce a given/observed hash value
> returned in challenge/response using fast and inexpensive CPU
> in a reasonable time.

[because the attack precomputes the hash of given-long-string]

> Now, however, why don't we use the reversed order for
> the two strings concatenated in the md5 calculation?
> 
>    MD5 ( short-passwd || given-long-string)

See Bruce Schneier, _Applied Cryptography_, 2nd ed., 18.14 (Message
Authentication Codes), section "One-Way Hash Function MAC".  In essence,
using the hash of a known string combined in some fashion with a secret as a
password hash is equivalent to making the password the secret for a MAC of
the known string.

Schneier cites a private communication with Bart Preneel (author of
RIPE-MAC) on possible weaknesses of the obvious constructions

        H(known-string || password)
        H(password || known-string)
        H(password || known-string || password)
        H(password-1 || known-string || password-2)

and suggests one of the following instead (rewritten as password hashes):

        H(password-1 || H(password-2 || known-string))
        H(password || H(password || known-string))     [ie. pw-1 == pw-2]
        H(password || pad || known-string || password) [pad pw to full
block]

The simplest of these, in terms of retrofitting existing systems that use
one of the constructions Ishikawa mentions, is

        H(password || H(password || known-string))

Michael Wojcik             [EMAIL PROTECTED]
MERANT
Department of English, Miami University

Reply via email to