Max A. wrote:
Hello!

Could anybody familiar with PGP products look at the following page
and explain in brief what it is about and what are consequences of the
described bug?

http://www.safehack.com/Advisory/pgp/PGPcrack.html


It seemed a bit obscure to me at first, but it says basically:

PGPdisk does not use key derived from passphrase, just does simply this:

if (somehash(entered_password) == stored_password_hashed) then access_granted();

That's the REPE CMPS chain instruction (string comparison). The check can be simply skipped using debugger by interrupting the program, changing CS:EIP (i.e. the place of execution) to resume after "successful" check. The text probably implies that the key is stored somewhere in the PGPdisk file and key's successful extraction does not depend on knowledge of the passphrase.

So if you change passphrase, the disk won't get re-encrypted, just by copy&pasting the old bytes you will revert to the old passphrase or you can create another disk with passphrase chosen by you and use copy&pasting method to decrypt other PGPdisk protected with passphrase.

I haven't checked myself if their claim is true, but it's possible.

Hope that helped
  O. Mikle

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to