Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
RE: Password Cracking Challenge...
From: Michael Wojcik (Michael.Wojcikmicrofocus.com)
Date: Mon Jul 28 2003 - 16:19:14 CDT
> From: David Riley [mailto:oscarthe-rileys.net]
> Sent: Monday, July 28, 2003 4:47 PM
> It is a good starting point, and that's what I thought of as well.
> However, the cutoff here seems to be 8 bytes instead of 7. I'm still
> looking at it, but the encoding of the second chunk seems
> dependent on the
> first (e.g. the "321" chunk of "Pa$$word321" is different than that of
That, plus the fact that the first 8 bytes of the hashes for "Password123"
and "Password321" are the same, suggests to me a 64-bit block cipher running
in some chaining mode. DES in CBC mode, for example.
The fact that all the hashes are 128 bits would suggest that the algorithm
either discards characters after the 16th, or perhaps that it uses the first
and last block of cipher output as the hash (which would be a little
better). It'd be nice to have two sample vectors of 17-byte passwords, only
differing in the 17th byte, to check.
I'll leave further speculation to the actual cryptanalysts (assuming any of
them find this sufficiently interesting to bother).
Principal Software Systems Developer, Micro Focus