Date: Mon, 5 Dec 2011 20:39:15 +0530 From: piyush mittal <piyush.cse29@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Bit slice implementation of DES based hashes @Simon So what it should be? On Mon, Dec 5, 2011 at 2:38 PM, Simon Marechal <simon@...quise.net> wrote: > On 03/12/2011 18:45, piyush mittal wrote: > > 1. Concatenate the username and the password to produce a plaintext > string; > > 2. Convert the plaintext string to uppercase characters; > > 3. Convert the plaintext string to multi-byte storage format; ASCII > > characters have the > > high byte set to 0x00; > > 4. Encrypt the plaintext string (padded with 0s if necessary to the next > > even block length) > > using the DES algorithm in cipher block chaining (CBC) mode with a fixed > > key value of > > 0x0123456789ABCDEF; > > 5. Encrypt the plaintext string again with DES-CBC, but using the last > > block of the output > > of the previous step (ignoring parity bits) as the encryption key. The > > last block of the > > output is converted into a printable string to produce the password hash > > value. > > This looks correct. Obviously step 3 will not work as expected when just > interleaving nul bytes. > -- Piyush Mittal M.Tech SEM-Ist Department of Computer Science and Engineering National Institute of Technology,Rourkela INDIA Email. piyush.cse29@...il.com 211cs2281@...rkl.ac.in Mob. +91 8260859399 Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.