On Thu, Dec 22, 2005 at 07:32:27PM +0100, Ed White wrote: > Quoting from: http://www.onlamp.com/lpt/a/6384 > > The biggest drawback of svnd is its lack of security in the general use case. > It is vulnerable to an offline dictionary attack. That is, you can generate a > database mapping known ciphertext blocks on the disk back into pass phrases > that can be accessed in O(1) without even being in possession of the disk. > What's even worse is that the same database will work on any svnd disk. It is > possible--and perhaps even likely--that large agencies such as the NSA have > constructed such a database and can crack a majority of the svnds in the > world in less than a second.
well, i'm not a developer nor a crypto expert, but basically that's just a way to do a brute force attack. it can work only with short keys, say with about 64 bits of entropy or less. that's about 16 random alphabets/digits. building lookup tables for larger keyspaces becomes rapidly unfeasible, so simply use a bigger key and you're safe from this type of attack > The way that one prevents an offline dictionary > attack is to use a salt in conjunction with the pass phrase, and this is what > I did when I wrote CGD by using PKCS#5 PBKDF2. Offline dictionary attacks > have been well-known since at least the '70s, and salting the pass phrase has > been standard practice for over 30 years. well yes, salting should mitigate the issue Juha