Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3BE48DD0EC7D3948BC183931D9150C2106D232ED@ii0015exch001u.iprc.lucent.com>
Date: Wed, 19 Jul 2006 20:13:15 +0530
From: "V, Bharath (Bharath)" <bharathv@...ent.com>
To: "'john-users@...ts.openwall.com'" <john-users@...ts.openwall.com>
Subject: RE: Unable to crack passwords

Hi,

Let me clarify the need of JTR for my application: 
For our application we have several user logins we want to validate the
passwords using the JTR tool.
I have the user names and passwords(in plain text) of all the users in a
text file, i just wanted to know whether the passwords are crackable thru
JTR or not.

Is there any way i can accomplish this? Should i have to encrypt the
password before giving it as input to the JTR tool?

Thanks
Bharath

-----Original Message-----
From: Solar Designer [mailto:solar@...nwall.com]
Sent: Wednesday, July 19, 2006 7:44 PM
To: john-users@...ts.openwall.com
Subject: Re: [john-users] Unable to crack passwords


On Wed, Jul 19, 2006 at 07:11:14PM +0530, V, Bharath (Bharath) wrote:
> I am using Blow Fish algorithm to encrypt the password and Password is
> "hello"

This doesn't make sense - or it might not be a complete description of
what you're doing.

Blowfish is a block cipher.  It encrypts data with a key, allowing for
quick decryption given the key.  In your case, is "hello" the data to
encrypt (with what key?) or the key you're encrypting some other data
with (what data?), or is it both the data and the key?

What are you doing this for?

Most likely, Blowfish - or any other fast cipher, for that matter - is
not appropriate for your task.  Instead, you might need to use a
higher-level algorithm specifically intended for password hashing.

The Blowfish-based password hashing method (known as bcrypt) that JtR
supports has very different properties from Blowfish itself.  You can
find a description of this hashing method in the paper linked from:

	http://www.openwall.com/crypt/
 
-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Was I helpful?  Please give your feedback here: http://rate.affero.net/solar

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.