How about blowfish? Since that is  available for password encryption in Solaris 
9 and above.
 
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
Octave J. Orgeron
Solaris Systems Engineer
http://www.opensolaris.org/os/community/sysadmin/
http://unixconsole.blogspot.com
[EMAIL PROTECTED]
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

----- Original Message ----
From: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]>
To: UNIX admin <[EMAIL PROTECTED]>
Cc: opensolaris-discuss@opensolaris.org
Sent: Friday, January 11, 2008 3:16:38 AM
Subject: Re: [osol-discuss] NSA has backdoors into Windows?



>
>What you're basically saying is, if you can't fathom how somebody
 could use
>the information from that document to brute force an MD5 hash, it
 doesn't
>have anything to do with it.

No, that's not at all what I am saying, and you don't seem to
 understand a 
few of the basic concepts here.

E.g., "brute force" has nothing to do with the paper; any hashing 
algortimh can be brute forced in theory,if you disregard certain facts 
about the size and the age of the known universe.

The paper, however, is not about "brute force"; it's about a break of
 MD5 
when applied to hash documents; MUCH quicker than brute force.

Now when it comes to password hashing, things are very different.

As with DES which has several weaknesses which make the key strength 
somewhat less than the 56 bits, there still is no better algorithm than
 
brute force for cracking DES passwords.  (But there are only 2^56 
different passwords so brute forcing them is feasible)  The reason for 
this is that the crypt() routines calls DES 25 times and uses the
 password
as the *key*.  It always encrypts the same plain text (all 0s) and
as such it does not allow the standard attacks against DES to be
 performed
on the encrypted passwords

So what we have is: theoretical break in DES -> password hashing with
 DES 
NOT weaker.

The same applies to the md5 password hashes: the md5 algorithm is run
 many 
times and in order to reverse the password you will need to find a
 matching
cleartext with certain properties (it starts with the same standard
 text
and then adds in the md5 hash from the step before) for a certain md5
 hash
and that 1000 or more times (each for every step of the algorithm).

The theoretical break does not allow for finding even one such hash;
it allows only to construct two documents with the same hash and that
is quite a bit different.

>You do know that busting MD5 hashes is as easy as cutting & pasting
 them into Google?

Do you have any idea how big a number 2^128 (the number of possible md5
hashes) is?   Do you REALLY thing they can all be found with google?

What would you do when you find a hash which matches the password file?
You can't use it as password because the md5 hash stored is NOT the
hash of the password but rather the result of a rather lengthier
 process
of mixing bits.

Brute force is the only option for md5 hashes; standard methods like
 crack
will for for this if you plugin a new crypt algorithm.

However, the key space is not longer 2^56, a number which can easily be
brute forced, (a million computers doing a million cracks per second
 each would
be finished within a day), but the rather longer 2^128. (a billion 
computers doing a billion cracks per second each would require 10^13
 years
to complete the task)

Casper

Casper

_______________________________________________
opensolaris-discuss mailing list
opensolaris-discuss@opensolaris.org





      
____________________________________________________________________________________
Be a better friend, newshound, and 
know-it-all with Yahoo! Mobile.  Try it now.  
http://mobile.yahoo.com/;_ylt=Ahu06i62sR8HDtDypao8Wcj9tAcJ 

_______________________________________________
opensolaris-discuss mailing list
opensolaris-discuss@opensolaris.org

Reply via email to