On Wednesday 29 December 2004 09:58, Kyrre Ness Sjobak <kyrre@xxxxxxxxxxxxxxxxxx> wrote: > man, 27.12.2004 kl. 18.01 skrev Russell Coker: > > On Friday 17 December 2004 08:19, Paul Iadonisi <pri.rhl3@xxxxxxxxxxx> wrote: > > > Maybe the new dual Opteron box I just ordered can crack the passwords > > > for both our keys. ;-) > > > > I wrote a program to crack keys with a hacked version of gpg (at the > > point in the code where it asks for the pass-phrase my code inserted a > > loop to go through the passwords). It's ugly but with the recent > > versions of gpg it works reasonably well (I discovered a memory leak > > whereby gpg would lose a couple of hundred bytes every attempt at a > > pass-phrase). > > What if it tried a dictionary first? Using a dictionary might get a faster attack or make cracking a long password feasible. But surely no-one is using a password that would be so easily cracked... -- http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark http://www.coker.com.au/postal/ Postal SMTP/POP benchmark http://www.coker.com.au/~russell/ My home page