1995-11-29 - Microsoft weak encryption

Header Data

From: Joel McNamara <joelm@eskimo.com>
To: cypherpunks@toad.com
Message Hash: 93da70ed48165124b545f387ed10987f523b93cb8bc4364af4a6202b41963c40
Message ID: <199511291447.GAA19250@mail.eskimo.com>
Reply To: N/A
UTC Datetime: 1995-11-29 14:57:16 UTC
Raw Date: Wed, 29 Nov 1995 22:57:16 +0800

Raw message

From: Joel McNamara <joelm@eskimo.com>
Date: Wed, 29 Nov 1995 22:57:16 +0800
To: cypherpunks@toad.com
Subject: Microsoft weak encryption
Message-ID: <199511291447.GAA19250@mail.eskimo.com>
MIME-Version: 1.0
Content-Type: text/plain


Peter Gutmann has an interesting article in sci.crypt, demonstrating how
weak Microsoft's encryption is with basic access control in Windows for
Workgroups (I'm assuming Win95 uses the same algorithm).  Essentially, he
shows how a 32-bit key is created to be passed to RC4 for encrypting .PWL
files.  I think a t-shirt is definitely in order for this.

Anyone up for writing some bruting code?

Joel






Thread