[1027] in Kerberos

home help back first fref pref prev next nref lref last post

J. Pato's comments on dictionary attacks

daemon@ATHENA.MIT.EDU (John Fletcher)
Mon Jun 18 13:30:11 1990

Date: Mon, 18 Jun 90 09:29:39 PDT
From: fletch@ocfmail.ocf.llnl.gov (John Fletcher)
To: kerberos@ATHENA.MIT.EDU
Cc: fletch@llnl.gov

        The concept of verifiable plaintext introduced by Mark, Lomas, Gong,
Saltzer, and Needham seems quite powerful.  It implies that if the following
hold for a conversation between two processes:
o       The only private information initially shared by the processes is a key
chosen from a small keyspace (e, g., a poorly chosen password).
o       An eavesdropper has access to the entire conversation (e. g., has
tapped the "wire").
o       The conversation includes verifiable plaintext (obtainable by some
number of en/decryptions starting with the original key).
Then the eavesdropper can discover the key and therefore the plaintext of the
entire conversation by "brute force".
        For example, the notion of "decoupling" a principal's password from his
secret key, but allowing retrieval of the secret key using the password as a
key, does not significantly impede the eavesdropper:  He can still try one
password at a time, getting a possible secret key and using that key to extract
the verifiable plaintext; his added cost is no more than that added to the
eavesdropped conversation, namely one more en/decryption per trial.

				 John Fletcher

home help back first fref pref prev next nref lref last post