From: “Vladimir Z. Nuri” <vznuri@netcom.com>
To: cypherpunks@toad.com
Message Hash: 4e9de7d696494aa911c3aac5839b72caba4e781813c6d2bf82ca6e073b6d3a5c
Message ID: <199511291949.LAA04349@netcom13.netcom.com>
Reply To: N/A
UTC Datetime: 1995-11-29 21:03:55 UTC
Raw Date: Thu, 30 Nov 1995 05:03:55 +0800
From: "Vladimir Z. Nuri" <vznuri@netcom.com>
Date: Thu, 30 Nov 1995 05:03:55 +0800
To: cypherpunks@toad.com
Subject: break microsoft!!!
Message-ID: <199511291949.LAA04349@netcom13.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
re: the recent message that windows 95 has weak password encryption
due to a 32 bit random seed sent to RC4--
this seems like another EXCELLENT opportunity for some major
cypherpunks press coverage and feather-in-the-cap accolades.
remember, the last break of the Netscape RC4 algorithm (or was it
MD5?) got front page NYT coverage and reverberated throughout the
entire media.
a "cypherpunk" accomplishing the same thing for Microsoft would
potentially get *major* notice.
I imagine a short .exe file that when run on the proper computer
prints out passwords as it cracks them. this would get the
attention of a LOT of people.
I have the MS C++ compiler, and if someone could discuss the difficulty
of writing this proposed "exe" file, the rough time required to break
the keys, and other considerations (physical access to server computer
required?) and maybe point to code pieces on the
net (RC4 etc.) to pull it off, I might start the effort myself.
Return to November 1995
Return to ““Vladimir Z. Nuri” <vznuri@netcom.com>”