Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 05 Dec 2011 10:08:04 +0100
From: Simon Marechal <simon@...quise.net>
To: john-dev@...ts.openwall.com
Subject: Re: Bit slice implementation of DES based hashes

On 03/12/2011 18:45, piyush mittal wrote:
> 1. Concatenate the username and the password to produce a plaintext string;
> 2. Convert the plaintext string to uppercase characters;
> 3. Convert the plaintext string to multi-byte storage format; ASCII
> characters have the
> high byte set to 0x00;
> 4. Encrypt the plaintext string (padded with 0s if necessary to the next
> even block length)
> using the DES algorithm in cipher block chaining (CBC) mode with a fixed
> key value of
> 0x0123456789ABCDEF;
> 5. Encrypt the plaintext string again with DES-CBC, but using the last
> block of the output
> of the previous step (ignoring parity bits) as the encryption key. The
> last block of the
> output is converted into a printable string to produce the password hash
> value.

This looks correct. Obviously step 3 will not work as expected when just
interleaving nul bytes.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.