aboutsummaryrefslogtreecommitdiff
path: root/security/pkcrack/pkg-descr
diff options
context:
space:
mode:
authorRenato Botelho <garga@FreeBSD.org>2005-07-28 10:32:17 +0000
committerRenato Botelho <garga@FreeBSD.org>2005-07-28 10:32:17 +0000
commit5e3cc60a87f61d37f708179eb50795107a69fc4c (patch)
tree1d5e13bde7afe11c55f4c9bb6845cad2e2ffe662 /security/pkcrack/pkg-descr
parent35977343dd182df0a8caedc0a8414de4def060c3 (diff)
downloadports-5e3cc60a87f61d37f708179eb50795107a69fc4c.tar.gz
ports-5e3cc60a87f61d37f708179eb50795107a69fc4c.zip
Notes
Diffstat (limited to 'security/pkcrack/pkg-descr')
-rw-r--r--security/pkcrack/pkg-descr24
1 files changed, 24 insertions, 0 deletions
diff --git a/security/pkcrack/pkg-descr b/security/pkcrack/pkg-descr
new file mode 100644
index 000000000000..99eb6127e594
--- /dev/null
+++ b/security/pkcrack/pkg-descr
@@ -0,0 +1,24 @@
+This package implements an algorithm for breaking the PkZip cipher that was
+devised by Eli Biham and Paul Kocher.
+
+This program applies a known plaintext attack to an encrypted file.
+A known-plaintext-attack recovers a password using the encrypted file and
+(part of) the unencrypted file.
+
+Please note that cryptographers use the word 'plaintext' for any kind of
+unencrypted data - not necessarily readable ASCII text.
+
+Before you ask why somebody may want to know the password when he already knows
+the plaintext think of the following situations:
+
+ - Usually there's a large number of files in a ZIP-archive. Usually all these
+ files are encrypted using the same password. So if you know one of the files,
+ you can recover the password and decrypt the other files.
+ - You need to know only a part of the plaintext (at least 13 bytes). Many files
+ have commonly known headers, like DOS .EXE-files. Knowing a reasonably long
+ header you can recover the password and decrypt the entire file.
+
+WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html
+
+- ehaupt
+ehaupt@critical.ch