From owner-cvs-all@FreeBSD.ORG Thu Jul 28 10:32:18 2005 Return-Path: X-Original-To: cvs-all@FreeBSD.org Delivered-To: cvs-all@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0820716A41F; Thu, 28 Jul 2005 10:32:18 +0000 (GMT) (envelope-from garga@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [216.136.204.115]) by mx1.FreeBSD.org (Postfix) with ESMTP id C900A43D49; Thu, 28 Jul 2005 10:32:17 +0000 (GMT) (envelope-from garga@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.1/8.13.1) with ESMTP id j6SAWHkQ038165; Thu, 28 Jul 2005 10:32:17 GMT (envelope-from garga@repoman.freebsd.org) Received: (from garga@localhost) by repoman.freebsd.org (8.13.1/8.13.1/Submit) id j6SAWHTp038164; Thu, 28 Jul 2005 10:32:17 GMT (envelope-from garga) Message-Id: <200507281032.j6SAWHTp038164@repoman.freebsd.org> From: Renato Botelho Date: Thu, 28 Jul 2005 10:32:17 +0000 (UTC) To: ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: ports/security Makefile ports/security/pkcrack Makefile distinfo pkg-descr X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 28 Jul 2005 10:32:18 -0000 garga 2005-07-28 10:32:17 UTC FreeBSD ports repository Modified files: security Makefile Added files: security/pkcrack Makefile distinfo pkg-descr Log: This package implements an algorithm for breaking the PkZip cipher that was devised by Eli Biham and Paul Kocher. This program applies a known plaintext attack to an encrypted file. A known-plaintext-attack recovers a password using the encrypted file and (part of) the unencrypted file. Please note that cryptographers use the word 'plaintext' for any kind of unencrypted data - not necessarily readable ASCII text. Before you ask why somebody may want to know the password when he already knows the plaintext think of the following situations: - Usually there's a large number of files in a ZIP-archive. Usually all these files are encrypted using the same password. So if you know one of the files, you can recover the password and decrypt the other files. - You need to know only a part of the plaintext (at least 13 bytes). Many files have commonly known headers, like DOS .EXE-files. Knowing a reasonably long header you can recover the password and decrypt the entire file. WWW: http://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack.html PR: ports/84192 Submitted by: Emanuel Haupt Revision Changes Path 1.629 +1 -0 ports/security/Makefile 1.1 +50 -0 ports/security/pkcrack/Makefile (new) 1.1 +2 -0 ports/security/pkcrack/distinfo (new) 1.1 +24 -0 ports/security/pkcrack/pkg-descr (new)