diff options
author | Renato Botelho <garga@FreeBSD.org> | 2005-07-28 10:32:17 +0000 |
---|---|---|
committer | Renato Botelho <garga@FreeBSD.org> | 2005-07-28 10:32:17 +0000 |
commit | 5e3cc60a87f61d37f708179eb50795107a69fc4c (patch) | |
tree | 1d5e13bde7afe11c55f4c9bb6845cad2e2ffe662 /security/pkcrack/pkg-descr | |
parent | 35977343dd182df0a8caedc0a8414de4def060c3 (diff) | |
download | ports-5e3cc60a87f61d37f708179eb50795107a69fc4c.tar.gz ports-5e3cc60a87f61d37f708179eb50795107a69fc4c.zip |
Notes
Diffstat (limited to 'security/pkcrack/pkg-descr')
-rw-r--r-- | security/pkcrack/pkg-descr | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/security/pkcrack/pkg-descr b/security/pkcrack/pkg-descr new file mode 100644 index 000000000000..99eb6127e594 --- /dev/null +++ b/security/pkcrack/pkg-descr @@ -0,0 +1,24 @@ +This package implements an algorithm for breaking the PkZip cipher that was +devised by Eli Biham and Paul Kocher. + +This program applies a known plaintext attack to an encrypted file. +A known-plaintext-attack recovers a password using the encrypted file and +(part of) the unencrypted file. + +Please note that cryptographers use the word 'plaintext' for any kind of +unencrypted data - not necessarily readable ASCII text. + +Before you ask why somebody may want to know the password when he already knows +the plaintext think of the following situations: + + - Usually there's a large number of files in a ZIP-archive. Usually all these + files are encrypted using the same password. So if you know one of the files, + you can recover the password and decrypt the other files. + - You need to know only a part of the plaintext (at least 13 bytes). Many files + have commonly known headers, like DOS .EXE-files. Knowing a reasonably long + header you can recover the password and decrypt the entire file. + +WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html + +- ehaupt +ehaupt@critical.ch |