home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.compression
- Path: sparky!uunet!ukma!netsys!agate!stanford.edu!leland.Stanford.EDU!kocherp
- From: kocherp@leland.Stanford.EDU (Paul Carl Kocher)
- Subject: Re: ARJ password cracker.
- Message-ID: <1992Nov17.004414.2374@leland.Stanford.EDU>
- Sender: news@leland.Stanford.EDU (Mr News)
- Organization: DSG, Stanford University, CA 94305, USA
- References: <1992Nov14.065336.17744@nwnexus.WA.COM> <3327@accucx.cc.ruu.nl> <1992Nov16.141357.4098@memstvx1.memst.edu>
- Date: Tue, 17 Nov 92 00:44:14 GMT
- Lines: 30
-
- In article <1992Nov16.141357.4098@memstvx1.memst.edu> ujacampbe@memstvx1.memst.edu (James Campbell) writes:
- >In article <3327@accucx.cc.ruu.nl>,
- >> ...Unfortunately most common ones are crackable (WP, PKZIP, ARJ).
- >> I know of WP and PKZIP crack programs but unfortunately not of ARJ crack
- >> programs. ARJ encryption is very weak but nooane seems to have made a tool
- >> for it.
- >
- >Why is ARJ's encryption "weak?" Also, where did you see a crack program for
- >PKZIP? All I've seen has been a couple of brute-force pass phrase checkers.
-
- With ARJ encryption the password is simply XORed onto the data stream, which
- definitely qualifies as a "weak" algorithm. A while ago I had a couple ARJ
- files I wanted to crack, and tried writing a program to crack ARJ files in
- general, but found that it was difficult to find enough redundancy in the
- compressed data stream to find passwords automatically. I ended up doing
- the same thing manually, and found the passwords with a few hours work.
-
- The only program that I know of that can mount any sort of an effective
- attack on PKZIP encryption is zipcrack, which I wrote about six months
- ago. Although it does a brute-force attack, it is fast enough that most
- passwords can be found quite quickly. (My '386-33 can test 100,000 passwords
- per second.) To my knowledge, the algorithm has not been cracked, but I also
- have not heard of any real attempts to cryptanalyze the algorithm.
-
- -- Paul Kocher
-
- ________Paul C. Kocher, Box 13554, Stanford, CA 94309, 415/497-6589_________
- kocherp@leland.stanford.edu (preferred), root@kocher.stanford.edu. Contract
- programming work sought (PC assembly, security, etc) -- write/call for info.
-
-