Date: Thu, 28 Jul 2005 10:32:17 +0000 (UTC) From: Renato Botelho <garga@FreeBSD.org> To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: ports/security Makefile ports/security/pkcrack Makefile distinfo pkg-descr Message-ID: <200507281032.j6SAWHTp038164@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
garga 2005-07-28 10:32:17 UTC
FreeBSD ports repository
Modified files:
security Makefile
Added files:
security/pkcrack Makefile distinfo pkg-descr
Log:
This package implements an algorithm for breaking the PkZip cipher that was
devised by Eli Biham and Paul Kocher.
This program applies a known plaintext attack to an encrypted file.
A known-plaintext-attack recovers a password using the encrypted file and
(part of) the unencrypted file.
Please note that cryptographers use the word 'plaintext' for any kind of
unencrypted data - not necessarily readable ASCII text.
Before you ask why somebody may want to know the password when he already knows
the plaintext think of the following situations:
- Usually there's a large number of files in a ZIP-archive. Usually all these
files are encrypted using the same password. So if you know one of the files,
you can recover the password and decrypt the other files.
- You need to know only a part of the plaintext (at least 13 bytes). Many files
have commonly known headers, like DOS .EXE-files. Knowing a reasonably long
header you can recover the password and decrypt the entire file.
WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html
PR: ports/84192
Submitted by: Emanuel Haupt <ehaupt@critical.ch>
Revision Changes Path
1.629 +1 -0 ports/security/Makefile
1.1 +50 -0 ports/security/pkcrack/Makefile (new)
1.1 +2 -0 ports/security/pkcrack/distinfo (new)
1.1 +24 -0 ports/security/pkcrack/pkg-descr (new)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200507281032.j6SAWHTp038164>
