lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <6.0.1.1.2.20040322185913.0203b408@mail.comcast.net> From: macecil at comcast.net (Michael Cecil) Subject: Re: pgp passphrase At 03:21 PM 3/22/2004, Valdis.Kletnieks@...edu said: >On Mon, 22 Mar 2004 14:58:23 +0100, Nico Golde <nion@....net> said: > >> ^^^^^^^^^^^^^^^^ password > >> ^^^^^^^^^^^^^ password > >> > Can you spot both passphrases? >> >> i think i am right. > >Right. You've proven that a *human* looking at the datastream can probably >guess the passphrases. The challenge was to write software that can do a >passable >job of it. Hmm.. that's almost an inverse of the Turing Test... ;) Why would it need to guess? It could simply try every logged string ending in a crlf. I doubt that overhead would even be noticeable to the victim. -- Michael Cecil macecil@...cast.net http://home.comcast.net/~macecil/howto/ http://home.comcast.net/~antiviruscd/
Powered by blists - more mailing lists