On 11/05/2019 12:34 am, Dana Mitchell wrote:

Doesn't the KDFAES password encryption algorithm make it *much* more difficult 
to crack passwords,  given access to the RACF database?  I realize nothing is 
impossible to crack.. but at least not currently feasible with current 
available hardware.

How slow is KDFAES? How many guesses per second are possible?

This article from 2013 has an interesting discussion on cracking passphrases:

https://arstechnica.com/information-technology/2013/10/how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking/

The researcher had compiled a library of 1.3 billion potential passphrases and was quite successful. There is a reference to $800 of hardware being able to do 30 billion guesses per second against Windows passwords.

I recall a number where KDFAES was 300,000 times slower (than something) - does that mean KDFAES might give 100,000 guesses per second? Which gives about 4 hours to try 1.3 billion phrases (if I didn't slip a decimal point somewhere!)

My belief is that users are not good enough at choosing passwords for a database to hold up to an offline attack - whatever the algorithm. You must assume that if someone can read the database, they will be able to crack at least some passwords. And you don't know which userids they will be.


Andrew Rowley

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to