1996-12-31 - Re: Unix Passwd

Header Data

From: iang@cs.berkeley.edu (Ian Goldberg)
To: cypherpunks@toad.com
Message Hash: a7e73a89176e80173161fe0168986a06dd5d7c92e0fe4aa91900f38875d08154
Message ID: <5abo51$d9v@abraham.cs.berkeley.edu>
Reply To: <199612261556.HAA05096@slack.lne.com>
UTC Datetime: 1996-12-31 19:05:28 UTC
Raw Date: Tue, 31 Dec 1996 11:05:28 -0800 (PST)

Raw message

From: iang@cs.berkeley.edu (Ian Goldberg)
Date: Tue, 31 Dec 1996 11:05:28 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Unix Passwd
In-Reply-To: <199612261556.HAA05096@slack.lne.com>
Message-ID: <5abo51$d9v@abraham.cs.berkeley.edu>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

In article <Pine.LNX.3.95.961226144201.17791B-100000@micro.internexus.net>,
Laszlo Vecsey  <master@internexus.net> wrote:
>From Applied Cryptography (2nd edition) I got the impression that it has
>been cracked. Do a netsearch for "Crypt Breakers Workbench", its a
>freeware program that attempts to do just that.

Please note the difference between crypt(3), the C library call used to
hash passwords, and crypt(1), the user program that encrypts files.  The
former is based on DES, and has not been broken (unless someone from the
NSA wants to speak up now).  The latter is based on the Enigma machine,
and is the one that "Crypt Breakers Workbench" attacks.

   - Ian

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMslj2kZRiTErSPb1AQGLyQQAqzq6bWByz48dJq+hnJs+jLCqJQ+1hfI6
zZgURqMYvpFwSq4eIiHr1ukNAKP7Vrr0eHSAFalkPDn1Ii/YueY/SRRE+8oFXIho
C+bJVnXpOBpjitHYpskSuGY4F5FmJrzn8U8vmlhes6viqNq00OmQANoJ0Gr+OUY4
VSHcKXwYMT4=
=Anex
-----END PGP SIGNATURE-----





Thread