Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 17 Feb 1997 13:04:21 -0800
From:      Jim Shankland <jas@flyingfox.COM>
To:        black@gage.com, jas@flyingfox.COM
Cc:        imp@village.org, lithium@cia-g.com, phk@critter.dk.tfs.com, security@freebsd.org
Subject:   Re: blowfish passwords in FreeBSD
Message-ID:  <199702172104.NAA14500@saguaro.flyingfox.com>

next in thread | raw e-mail | index | archive | help
>From black@gage.com Mon Feb 17 12:11:49 1997
Return-Path: black@gage.com
Received: (from smap@localhost) by saguaro.flyingfox.com (8.6.12/8.6.10) id MAA14448 for <jas@flyingfox.COM>; Mon, 17 Feb 1997 12:11:48 -0800
Received: from brimstone.gage.com(205.217.2.10) by saguaro.flyingfox.com via smap (V1.3)
	id sma014446; Mon Feb 17 12:11:39 1997
Received: (from mail@localhost)
          by fusion.gage.com (8.8.3/8.8.4)
	  id OAA13645; Mon, 17 Feb 1997 14:15:41 -0600 (CST)
Received: from octopus.gage.com(158.60.57.50) by fusion.gage.com via smap (V2.0beta)
	id xma013641; Mon, 17 Feb 97 14:15:40 -0600
Received: from squid.gage.com (squid [158.60.57.101]) by octopus.gage.com (8.7.5/8.7.3) with SMTP id OAA01624; Mon, 17 Feb 1997 14:15:39 -0600 (CST)
Received: from schemer by squid.gage.com (NX5.67e/NX3.0S)
	id AA06596; Mon, 17 Feb 97 14:15:38 -0600
Message-Id: <9702172015.AA06596@squid.gage.com>
Received: by schemer.gage.com (NX5.67g/NX3.0X)
	id AA03328; Mon, 17 Feb 97 14:15:37 -0600
Content-Type: text/plain
Mime-Version: 1.0 (NeXT Mail 4.0 v146.2)
In-Reply-To: <199702171906.LAA14225@saguaro.flyingfox.com>
X-Nextstep-Mailer: Mail 3.3 (Enhance 1.3)
Received: by NeXT.Mailer (1.146.2)
From: Ben Black <black@gage.com>
Date: Mon, 17 Feb 97 14:15:37 -0600
To: Jim Shankland <jas@flyingfox.COM>
Subject: Re: blowfish passwords in FreeBSD
Cc: imp@village.org, phk@critter.dk.tfs.com, lithium@cia-g.com,
        security@freebsd.org
References: <199702171906.LAA14225@saguaro.flyingfox.com>
Status: R

[I wrote:]
> Hmm.  2^56 possible keys, so on average, you'd need to try
> 2^55 keys.  Say it takes 2^14 seconds (that's a little more
> than three hours, but about right); then this board was doing
> 2^41 encryptions per second, or roughly 2 million per
> microsecond.

Ben Black <black@gage.com> writes:

> he didn't say it averaged 3 hours.  he said it took it 3 hour
> on a specific key.

OK.  Suppose the machine got very lucky, and happened to hit
the right key after searching only 1/2^15 of the key space.
The chances of getting this lucky are about 1 in 30,000.  Then
the machine did 2^41 encryptions in 2^14 seconds, or 2^27 encryptions
per second, or about 128 per microsecond.  Still not too shabby, and
I still want to know how much this board costs :-).

It is, of course, always possible to guess the right password the
very first time, thereby cracking the account in well under a second.
This will work even on an old 386 box lying around your lab, and
does not require a card with ASICs.  All you need is very good luck :-).
Whether this says anything meaningful about the cryptographic
strength of DES is debatable.

Jim Shankland
Flying Fox Computer Systems, Inc.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199702172104.NAA14500>