1996-04-15 - pgpcrack review [failed]

Header Data

From: Black Unicorn <unicorn@schloss.li>
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: ff7379fd2bca24e0092d4b1895263d260afbcbd94e9d006cf3ba1d4ef13fd6df
Message ID: <Pine.SUN.3.91.960415010258.19675P-100000@polaris.mindport.net>
Reply To: N/A
UTC Datetime: 1996-04-15 14:39:03 UTC
Raw Date: Mon, 15 Apr 1996 22:39:03 +0800

Raw message

From: Black Unicorn <unicorn@schloss.li>
Date: Mon, 15 Apr 1996 22:39:03 +0800
To: Cypherpunks <cypherpunks@toad.com>
Subject: pgpcrack review [failed]
Message-ID: <Pine.SUN.3.91.960415010258.19675P-100000@polaris.mindport.net>
MIME-Version: 1.0
Content-Type: text/plain



I complied pgpcrack (which was on the list a few days ago) on a 
SPARCstation-10 running SunOS 4.1.4.

Running pgpcrack on a -c encrypted file (duress.pgp) encrypted with the 
passphrase "lover" (which is in my dictionary file) results in the 
following output after under 1 second.  (The dictionary file I was using 
is about 250k):

PGPCrack passphrase: cruddy

Using the same plaintext encrypted with "pain" the following output after 
3 seconds or so:

PGPCrack passphrase: promulgate

A third time, same plaintest -c'd with "avoid" results in:

PGPCrack passphrase: cerebral

Seems to work just fine on linux.

---
My preferred and soon to be permanent e-mail address:unicorn@schloss.li
"In fact, had Bancroft not existed,       potestas scientiae in usu est
Franklin might have had to invent him."    in nihilum nil posse reverti
00B9289C28DC0E55  E16D5378B81E1C96 - Finger for Current Key Information
Opp. Counsel: For all your expert testimony needs: jimbell@pacifier.com








Thread