[cryptography] H4-U16 cipher
Here is an explanation of a new cryptographic principle that I call a homomorphic linear set. Please peruse this page. http://s13.zetaboards.com/Crypto/topic/7122592/1/#new Paxton Sent from Yahoo Mail on Android ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Password Blacklist that includes Adobe's Motherload?
On 14 November 2013 03:29, shawn wilson ag4ve...@gmail.com wrote: This is the only thing I've seen (haven't really looked): http://stricture-group.com/files/adobe-top100.txt I have to ask: snoopy1 more popular than snoopy? wtf? ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Password Blacklist that includes Adobe's Motherload?
On Thu, Nov 14, 2013 at 5:57 PM, Ben Laurie b...@links.org wrote: On 14 November 2013 03:29, shawn wilson ag4ve...@gmail.com wrote: This is the only thing I've seen (haven't really looked): http://stricture-group.com/files/adobe-top100.txt I have to ask: snoopy1 more popular than snoopy? wtf? Probably people who reuse passwords and are used to sites that require a number in the password (or picked their go-to password when signing up for a site that did) -- snoopy1 works more often. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Password Blacklist that includes Adobe's Motherload?
On Thu, Nov 14, 2013 at 6:07 PM, Patrick Mylund Nielsen cryptogra...@patrickmylund.com wrote: On Thu, Nov 14, 2013 at 5:57 PM, Ben Laurie b...@links.org wrote: On 14 November 2013 03:29, shawn wilson ag4ve...@gmail.com wrote: This is the only thing I've seen (haven't really looked): http://stricture-group.com/files/adobe-top100.txt I have to ask: snoopy1 more popular than snoopy? wtf? Probably people who reuse passwords and are used to sites that require a number in the password (or picked their go-to password when signing up for a site that did) -- snoopy1 works more often. The digit is obviously there because there because of today's password complexity rules used most sites that demand at least one digit or a 3 of 4 char sets of uppercase, lowercase, digits, or special characters. Besides that, (unfortunately) it's a lot easier to change 'snoopy1' to 'snoopy2' then to 'snoopy3', etc. when your password inevitably changes. Plus, it makes a lot easier to remember than to start out with 'sn00py' and then go to 'sn11py', 'sn22py', etc. :-) -kevin -- Blog: http://off-the-wall-security.blogspot.com/ NSA: All your crypto bit are belong to us. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Password Blacklist that includes Adobe's Motherload?
On 2013-11-13, at 8:13 PM, Jeffrey Walton noloa...@gmail.com wrote: Is anyone aware of a blacklist that includes those 150 million records from Adobe's latest breach? You are aware that these haven’t all been decrypted? (Or is there some news I’ve missed.) The passwords were encrypted, unsalted, using 3DES in ECB mode. But the actual encryption key is unknown. So the way that passwords have been “decrypted” is on a case by case basis. For example, if we have, say, 100,000 users using the same password, and one of them credibly ‘fesses up to what their password was, then we know what that password was for all of those users. These are reinforced by the fact that many of the passwords included password hints, often simply saying what the password was. We also can work out what some of the more popular passwords are by comparing with other breaches. For example if al...@example.com is known to use the password snoopy1 in both the Sony and LinkedIn breaches, and gives the same hint in the Adobe data, that is a big clue. If we find a few dozen other reusers that way we can say with high confidence what that particular password is. The ECB mode and small block size of 3DES has also been helpful. So suppose we have about 6700 people corresponding to this password 6682 /NpNslkFN4nioxG6CatHBw== and 3402 corresponding to this one 3402 /FkacZU/hWrioxG6CatHBw== Even with the base64 encoding, you can see that the second block of each of those passwords is the same as it encrypts to ioxG6CatHBw (I really should convert the base64 to hex) So if we find (and I haven’t correlated what I’m working on with actual passwords, so now this is hypothetical) that ioxG6CatHBw appears for the last block of the encryption of “password1”, then we know that that is the encryption of “1” plus padding. Even a cursory glance at the data and you see penguins. My project is on relative frequency of passwords, so I’m not actually trying to figure out that plaintext. I’m interested in relative password frequency. Several people have noticed that the popularity of passwords resembles a power law distribution. David Malone and colleagues have specifically looked that this. @article{MaloneMaher11:CoRR, Author = {Malone, David and Maher, Kevin}, Journal = {CoRR}, Title = {Investigating the Distribution of Password Choices}, Volume = {abs/1104.3722}, Year = {2011}} And I’ve seen similar in my own work. The “problem” is that if the power law distribution holds up with a “big” exponent (near or above 1) then that would indicate a situation where popularity contributes to popularity. So I want the resemblance to a power law distribution to be superficial. There are other distributions that can look similar. Either that I want an explanation for why the popularity of password choice would make it more attractive to others. Are people really being influenced by their password choices by others? I think that high password reuse might be able to account for some of the power lawish distribution, but I haven’t quite worked that out. At any rate, this data dump is perfect for me. I’ve only just begun working on it, but unsalted ECB encrypted passwords allow me to count frequencies. I tried finding a list and was not successful. There isn’t a list of these decrypted. Jeremi Gosney has, in collaboration with others, worked out what the passwords are for the 100 most frequent. Troy Hunt is doing some excellent work on correlating with other breaches. Cheers, -j –- Jeffrey Goldberg Chief Defender Against the Dark Arts @ AgileBits http://agilebits.com ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
Re: [cryptography] Password Blacklist that includes Adobe's Motherload?
On 15/11/13 06:35 AM, Kevin W. Wall wrote: Besides that, (unfortunately) it's a lot easier to change 'snoopy1' to 'snoopy2' then to 'snoopy3', etc. when your password inevitably changes. Plus, it makes a lot easier to remember than to start out with 'sn00py' and then go to 'sn11py', 'sn22py', etc. :-) When I last worked in a formally controlled certified security office, the password to the system was indeed securityN where N incremented every month when the system kicked back and insisted on a password change. (oops, that's probably security leak...) It reminds me of the story about the British health system that spent untold millions putting in individual smart token control systems, so as to control access to security-critical resources. Every place discovered the same correct way to drive the system. Access was sorted and aligned by seniority of staff, and every morning, the designated senior person would plug their token into a given device, then walk away and get back to work. iang ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography