From owner-freebsd-hackers Fri Jul 26 07:36:35 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id HAA29709 for hackers-outgoing; Fri, 26 Jul 1996 07:36:35 -0700 (PDT) Received: from brasil.moneng.mei.com (brasil.moneng.mei.com [151.186.109.160]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id HAA29700 for ; Fri, 26 Jul 1996 07:36:32 -0700 (PDT) Received: (from jgreco@localhost) by brasil.moneng.mei.com (8.7.Beta.1/8.7.Beta.1) id JAA16695; Fri, 26 Jul 1996 09:35:29 -0500 From: Joe Greco Message-Id: <199607261435.JAA16695@brasil.moneng.mei.com> Subject: Re: $100 HACKING CONTEST! To: jbenson@nando.net (James Benson) Date: Fri, 26 Jul 1996 09:35:28 -0500 (CDT) Cc: hackers@freebsd.org In-Reply-To: <4t8tii$7cm@castle.nando.net> from "James Benson" at Jul 25, 96 10:47:46 pm X-Mailer: ELM [version 2.4 PL24] Content-Type: text Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > Finally, something new to hack (or at least try to)! Check out our > contest at: > > http://www.webbuild.com/~jbenson/contest.html > > Good luck! (You'll need it....) This isn't hacking, this is cracking, and not very exciting at that. Want to add a little excitement? Provide the algorithm. A good encryption algorithm can stand on its own, and in theory will not provide much helpful information when breaking it. Example: DES, a relatively strong encryption algorithm based on data loss, tables, and bit operations. Granted, a 56-bit key is not too strong these days, but the theories behind DES still appear to be quite reasonable and secure. A bad encryption algorithm might appear relatively strong at first, because it is REALLY easy to scramble bits, but an analysis of the encryption algorithm might suggest a trivial way to either break the code or substantially reduce the size of the search space. An encryption product with a shoddy algorithm is worth about as much as a copy of /bin/cat. Even if you do not provide source, people will still determine how the tool works by reverse engineering (disassembling), and if the algorithm is weak, it will be easy to break. If the algorithm is strong, ... Good luck, ... Joe ------------------------------------------------------------------------------- Joe Greco - Systems Administrator jgreco@ns.sol.net Solaria Public Access UNIX - Milwaukee, WI 414/546-7968