|
Message-ID: <CAG5=z92vW70o_4evdhc+2t45XGHc1Oxtvhr7WuWz=LJwBdiRzw@mail.gmail.com>
Date: Mon, 5 Dec 2011 20:39:15 +0530
From: piyush mittal <piyush.cse29@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Bit slice implementation of DES based hashes
@Simon
So what it should be?
On Mon, Dec 5, 2011 at 2:38 PM, Simon Marechal <simon@...quise.net> wrote:
> On 03/12/2011 18:45, piyush mittal wrote:
> > 1. Concatenate the username and the password to produce a plaintext
> string;
> > 2. Convert the plaintext string to uppercase characters;
> > 3. Convert the plaintext string to multi-byte storage format; ASCII
> > characters have the
> > high byte set to 0x00;
> > 4. Encrypt the plaintext string (padded with 0s if necessary to the next
> > even block length)
> > using the DES algorithm in cipher block chaining (CBC) mode with a fixed
> > key value of
> > 0x0123456789ABCDEF;
> > 5. Encrypt the plaintext string again with DES-CBC, but using the last
> > block of the output
> > of the previous step (ignoring parity bits) as the encryption key. The
> > last block of the
> > output is converted into a printable string to produce the password hash
> > value.
>
> This looks correct. Obviously step 3 will not work as expected when just
> interleaving nul bytes.
>
--
Piyush Mittal
M.Tech SEM-Ist
Department of Computer Science and Engineering
National Institute of Technology,Rourkela
INDIA
Email. piyush.cse29@...il.com
211cs2281@...rkl.ac.in
Mob. +91 8260859399
Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.