Password security - Another idea

Piet van Oostrum piet at ruuinf
Tue Jan 3 01:49:31 AEST 1989


In article <230 at ibd.BRL.MIL>, heilpern at ibd (Mark A. Heilpern ) writes:
`If the 2-letter key used in encryption were not known, this boosts the 80 hour
`upper end to ~37 years. (80 hours * 4096 methods of encryption)

In article <1988Dec26.151208.19016 at ziebmef.uucp>, mdf at ziebmef (Matthew Francey) writes:
`In article <12750 at bellcore.bellcore.com>, karn at ka9q.bellcore.com (Phil Karn) writes:
`		      A 56-bit search space is well beyond the brute-force
`> abilities of most crackers (though perhaps not the NSA) **IF** the keys are
`> widely and evenly distributed within it.
`
`  A possible solution is to have each site pick its own secret encryption
`method (for example, start with a non-zero block).  Could it remain secret
`for a long long time (years... it would be a major pain changing it)?
`Probably not, since anyone could disassemble passwd...

In article <13022 at bellcore.bellcore.com>, karn at ka9q (Phil Karn) writes:

`     The point is that to be maximally effective, the UNIX password
`algorithm should be given keys with 56 bits of entropy. That is, the
`distribution of actual user keys should be uniformly distributed over
`all 2^56 possible values.

In article <614 at rufus.math.nwu.edu>, john at rufus (John Franks  Dept. of Math.  Northwestern Univ.) writes:
`
`Question: Why are we limited to 56 bits?  Surely  not  for  effi-
`ciency  or to save space.  This is an instance where we *want* to
`be slow.  I've heard that NSA lobbied for smallish keys  in  com-
`mercial  DES  rather than larger ones (the implication being they
`wanted a  size they  could handle easily).  Does  anybody know if 
`there is any truth to this?
`
Actually, it wouldn't be difficult to get a search space of more than 2^56:

First, force the user to use long passwords, from a reasonable set of
characters (like a minimum percentage from each of [a-z],[A-Z],[0-9] and
[!"$%^&*()_+{}<>?:@]).

Now the input to the encryption algorithm consists of:
	12 bits 'salt'
	56 bits DES-key
	64 bits constant to be encrypted.

that makes a total of 132 bits. If you take each of the above 3
parts from various bits of the password, then we could accommodate 19
character passwords.
-- 
Piet van Oostrum, Dept of Computer Science, University of Utrecht
Padualaan 14, P.O. Box 80.089, 3508 TB Utrecht, The Netherlands
Telephone: +31-30-531806        UUCP: ...!mcvax!hp4nl!ruuinf!piet



More information about the Comp.unix.wizards mailing list