|
Message-ID: <4EDC89F4.1020806@banquise.net> Date: Mon, 05 Dec 2011 10:08:04 +0100 From: Simon Marechal <simon@...quise.net> To: john-dev@...ts.openwall.com Subject: Re: Bit slice implementation of DES based hashes On 03/12/2011 18:45, piyush mittal wrote: > 1. Concatenate the username and the password to produce a plaintext string; > 2. Convert the plaintext string to uppercase characters; > 3. Convert the plaintext string to multi-byte storage format; ASCII > characters have the > high byte set to 0x00; > 4. Encrypt the plaintext string (padded with 0s if necessary to the next > even block length) > using the DES algorithm in cipher block chaining (CBC) mode with a fixed > key value of > 0x0123456789ABCDEF; > 5. Encrypt the plaintext string again with DES-CBC, but using the last > block of the output > of the previous step (ignoring parity bits) as the encryption key. The > last block of the > output is converted into a printable string to produce the password hash > value. This looks correct. Obviously step 3 will not work as expected when just interleaving nul bytes.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.