1995-11-29 - Re: Microsoft weak encryption

Header Data

From: Adam Shostack <adam@lighthouse.homeport.org>
To: joelm@eskimo.com (Joel McNamara)
Message Hash: 921be4c89aaa26fcb85e736a3af279821903bd218435465d3dbb04255a1ecf89
Message ID: <199511291559.KAA15633@homeport.org>
Reply To: <199511291447.GAA19250@mail.eskimo.com>
UTC Datetime: 1995-11-29 16:17:48 UTC
Raw Date: Thu, 30 Nov 1995 00:17:48 +0800

Raw message

From: Adam Shostack <adam@lighthouse.homeport.org>
Date: Thu, 30 Nov 1995 00:17:48 +0800
To: joelm@eskimo.com (Joel McNamara)
Subject: Re: Microsoft weak encryption
In-Reply-To: <199511291447.GAA19250@mail.eskimo.com>
Message-ID: <199511291559.KAA15633@homeport.org>
MIME-Version: 1.0
Content-Type: text


Joel McNamara wrote:

| Peter Gutmann has an interesting article in sci.crypt, demonstrating how
| weak Microsoft's encryption is with basic access control in Windows for
| Workgroups (I'm assuming Win95 uses the same algorithm).  Essentially, he
| shows how a 32-bit key is created to be passed to RC4 for encrypting .PWL
| files.  I think a t-shirt is definitely in order for this.

	While Peter did a nice job of showing how Windows stores
passwords, my understanding is that those passwords are decrypted by
Windows, and sent over the net in the clear.  Seems much easier to
snarf them there..

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume






Thread