On Mon, 2 Sep 2013 09:44:27 +0100, Costin Enache wrote:

>The password phrase hash can be split into blocks of 8 bytes, and each of
>them "cracked" independently, also in parallel. 
>
Sounds like a half-hearted implementation -- what would have been the
additional cost of using larger blocks?

>Another flaw, concerning the hash storage, allows for collisions in the last 
>block, 
>if the phrase length is not exactly multiple of 8.
>
The obvious question, then, is would the method be improved simply by padding
that last block (with blanks, e.g.; or better characters invalid in the 
passphrase)
to a multiple of 8.  Does the passphrase syntax permit trailing blanks so that
passphrases differing only in the number of trailing blanks are considered
different?

Does the method still operate by storing the user ID encrypted by the (chunks 
of)
the passphrase?  Is any weakness introduced by the 7-character (practical)
limitation of user IDs?

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to