Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 Dec 2011 20:39:15 +0530
From: piyush mittal <piyush.cse29@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Bit slice implementation of DES based hashes

@Simon

So what it should be?

On Mon, Dec 5, 2011 at 2:38 PM, Simon Marechal <simon@...quise.net> wrote:

> On 03/12/2011 18:45, piyush mittal wrote:
> > 1. Concatenate the username and the password to produce a plaintext
> string;
> > 2. Convert the plaintext string to uppercase characters;
> > 3. Convert the plaintext string to multi-byte storage format; ASCII
> > characters have the
> > high byte set to 0x00;
> > 4. Encrypt the plaintext string (padded with 0s if necessary to the next
> > even block length)
> > using the DES algorithm in cipher block chaining (CBC) mode with a fixed
> > key value of
> > 0x0123456789ABCDEF;
> > 5. Encrypt the plaintext string again with DES-CBC, but using the last
> > block of the output
> > of the previous step (ignoring parity bits) as the encryption key. The
> > last block of the
> > output is converted into a printable string to produce the password hash
> > value.
>
> This looks correct. Obviously step 3 will not work as expected when just
> interleaving nul bytes.
>



-- 
Piyush Mittal
M.Tech SEM-Ist
Department of Computer Science and Engineering
National Institute of Technology,Rourkela
INDIA
Email. piyush.cse29@...il.com
          211cs2281@...rkl.ac.in
Mob. +91 8260859399

[ CONTENT OF TYPE text/html SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ