[18102] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

cracking passwords and challenge/response

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Sat Aug 6 18:29:02 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: cryptography@metzdowd.com
Date: Sat, 06 Aug 2005 16:48:02 -0400

Folks might want to look at http://www.huitema.net/talks/ietf63-security.ppt
the slides from a talk Christian Huitema gave at the Applications Area 
at IETF63 this past week.  Of particular interest is just how cheap it 
is to brute-force a passphrase these days, especially if it's just used 
as a cryptographic key with known plaintext (i.e., in challenge/
response protocols).

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post