1996-01-21 - Re: Hack Lotus?

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: trei@process.com
Message Hash: e8bdb317347d00002f1598de36e0209c5b60f319c11da6d8eedd9d60acda4189
Message ID: <199601201509.KAA02967@jekyll.piermont.com>
Reply To: <9601200326.AA09366@toad.com>
UTC Datetime: 1996-01-21 02:32:02 UTC
Raw Date: Sun, 21 Jan 1996 10:32:02 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Sun, 21 Jan 1996 10:32:02 +0800
To: trei@process.com
Subject: Re: Hack Lotus?
In-Reply-To: <9601200326.AA09366@toad.com>
Message-ID: <199601201509.KAA02967@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain

"Peter Trei" writes:
> Think it through. 
> 8 Bob's copy of lotus repeats steps 4 & 5 above, and checks if
>    it's version of Epe(K') matches the one sent. 

Hmm, it could, but it isn't going to be trivial unless the thing is
running straight RSA without a random pad.

If it isn't randomly padding, then it possible to make a table of the
2^24 possible encryptions and break traffic without knowing the RSA
key the government uses. It would require about 16GB of storage,
granted, but that isn't exactly impossible in todays world -- that
only costs about $4000. It would also require a lot of CPU, but not an
impossible amount and the investment would be one time. Given such a
table properly indexed, you could crack any passing key just by
indexing to find out three bytes of the 64 bit key and then go after
the other 40 in fairly short order. That would make a new "Hack IBM"
(Lotus is owned by them) promotion on C2 rather fun!

If they are randomly padding, then they would have to send the pad
along, presumably encrypted under the RC4 key or under Bob's RSA key.

Someone has to deconstruct the code. At this point, we are starting to
fly off into the world of speculation.

> > Of course, I'll point out that 64 bit RC4 keys are still not
> > particularly heartwarming...
> Granted, but we don't know if they use RC4, DES, or what.

They are RC4 if they haven't changed that part of the design.