[6600] in Kerberos

home help back first fref pref prev next nref lref last post

Re: DES Encryption with Kerberos.

daemon@ATHENA.MIT.EDU (Darren Reed)
Sun Feb 4 23:09:29 1996

Date: Mon, 5 Feb 1996 14:43:48 +1100
From: darrenr@nabaus.com.au (Darren Reed)
To: kerberos@MIT.EDU, jeff@sdsc.edu

> In article <199601300246.NAA09538@phaeton.rais.nabaus.com.au>,
> Darren Reed <darrenr@nabaus.com.au> wrote:
> >DES's operation is endian dependant,
> >so that compiling the same code (which is ignorant of byte order) on intel box
> >(ie pc) and a Sun sparc will not decrypt/encrypt correctly.
> 
> This may be true for some specific implementations of DES, but it need
> not be.  For example, I believe the ufc-crypt implementation of DES
> works correctly without the aid of endian-based #ifdef's or other such
> accommodations.  This is definitely true of a DES implementation I
> once wrote myself.

The difficulty turned out to a difference in the way keys were being used and
passed to the encryption routines. >:-/

What eventually woke us upto this was getting a known true result for DES
and attempting to make the libraries agree with that.  The main help here
was getting the key in the right `format'.

The test case I used was from a 'C Programming Column', by Al Stevens.  I'm
not sure where the column originates, I was just given text files, documenting
implementing, and comments on that, DES.

Using ECB, the following examples were given:

Key:   0123456789abcdef  0123456789abcdef  0123456789abcdef
Text:  4e6f772069732074  68652074696d6520  666f7220616c6c20
Encr:  3fa40e8a984d4815  6a271787ab8883f9  893d51ec4b563b53

darren.

home help back first fref pref prev next nref lref last post