Path: gmdzi!ira.uka.de!sol.ctr.columbia.edu!cunixf.cc.columbia.edu!em21 From: e...@cunixf.cc.columbia.edu (Eben Moglen) Newsgroups: sci.crypt Subject: Archiver encryption security Message-ID: <1991Dec29.081650.11688@cunixf.cc.columbia.edu> Date: 29 Dec 91 08:16:50 GMT Organization: Columbia University Lines: 4 Has anyone considered seriously the security of the various encryption algorithms in use in the various archiver programs? PKZIP, ARJ, ZOO and other similar products include a scrambling facility, and the algorithms in use should be scrutinized, I think. Anyone have any useful information?
Path: gmdzi!ieee.org!dorm.rutgers.edu!rutgers!usc!elroy.jpl.nasa.gov! ames!network.ucsd.edu!qualcom.qualcomm.com!chicago.qualcomm.com!karn From: k...@chicago.qualcomm.com (Phil Karn) Newsgroups: sci.crypt Subject: Re: Archiver encryption security Message-ID: <1991Dec30.005026.1177@qualcomm.com> Date: 30 Dec 91 00:50:26 GMT References: <1991Dec29.081650.11688@cunixf.cc.columbia.edu> Sender: n...@qualcomm.com Organization: Qualcomm, Inc Lines: 27 Nntp-Posting-Host: chicago.qualcomm.com I never use the built-in encryption facility in PKZIP. If I need to protect an archive, I create it normally and then run it through my own DES software. This has the following advantages over using the built-in encryption: 1. I wrote the encryption code and know it to be at least a faithful implementation of DES, without any trap doors of my own. I have no idea what the encryption algorithm is in PKZIP, and whether there are any trap doors, deliberate or otherwise. 2. The encryption option has been removed from the shareware version of PKZIP, ostensibly for export control reasons. You have to get a registered copy and not live outside the US or Canada. This makes the built-in encryption in PKZIP a lot less useful in practice when you want to exchange encrypted files with others. My technique does have the disadvantage of requiring me to decrypt an entire archive even if I only want to extract a single file. My DES encryption code, including full source, can be obtained by anonymous FTP from ucsd.edu, /hamradio/packet/ka9q/des/des.tar.Z. It runs under both MS-DOS and UNIX, and is backward compatible with the SunOS 'des' command. And it is completely in the public domain -- you may do whatever you want with it. Phil
Path: gmdzi!unido!mcsun!corton!chorus!nocturne.chorus.fr!jloup From: jl...@nocturne.chorus.fr (Jean-Loup Gailly) Newsgroups: sci.crypt Subject: Re: Archiver encryption security Message-ID: <12576@chorus.fr> Date: 31 Dec 91 16:27:27 GMT References: <1991Dec29.081650.11688@cunixf.cc.columbia.edu> <1991Dec30.005026.1177@qualcomm.com> Sender: jl...@chorus.fr Reply-To: jl...@nocturne.chorus.fr (Jean-Loup Gailly) Organization: Chorus systemes, Saint Quentin en Yvelines, France Lines: 79 Eben Moglen <e...@cunixf.cc.columbia.edu> writes: > Has anyone considered seriously the security of the various encryption > algorithms in use in the various archiver programs? PKZIP, ARJ, ZOO and > other similar products include a scrambling facility, and the algorithms > in use should be scrutinized, I think. I think I have broken the encryption scheme of pkzip if the random header is known. (This header consists of 10 random bytes prefixing the plaintext plus two known bytes. For more details, please look at appnote.txt in the pkzip documentation.) In the portable zip, the 'random' header is in fact not much random, since it is directly related to the date and time at which the zip file was created. (I will try to improve this for the next version of zip.) pkzip might use a better algorithm (e.g., based on the delay between each key press). But pkzip 1.10 has another vulnerability, because it stores pre-computed Huffman trees before the compressed data, so a lot of plaintext is known. pkzip 2.0 will be less vulnerable. If the random header is really random, then I think that the encryption scheme is quite good and will resist all amateur attacks for a well chosen password. It is however likely that it will not resist attacks by cryptanalyst experts (which I am not). The most effective attack by amateurs is a brute force attempt at likely passwords. Such attacks are very effective to break Unix passwords. For the pkzip encryption scheme, the attack is even more effective because one can determine very quickly (a few dozen instructions) if a password is correct or not. So it is quite easy to try several billions passwords on any workstation. Any password consisting of lower case letters only and of 7 characters or less can probably be cracked overnight. The encryption algorithm of ARJ is kept secret, but its author Robert Jung says that "it only uses an XOR string routine which can be broken with a little patience". zoo and lha do not include an encryption capability. Phil Karn <k...@chicago.qualcomm.com> writes: > I have no idea what the encryption algorithm is in PKZIP, and whether > there are any trap doors, deliberate or otherwise. The algorithm is public. Pseudo-code is given in appnote.txt in the pkzip documentation, and C code is available for the portable zip. (ftp sites given below.) > 2. The encryption option has been removed from the shareware version > of PKZIP, ostensibly for export control reasons. For the same reasons, the encryption code for the portable zip is distributed separately. You must get it from a US site if you are within the US and from a European site otherwise. Jean-loup Gailly ftp info: From the US only: pit-manager.mit.edu:/pub/zip/crypt/zipcrypt.shar (mail server at mail-ser...@pit-manager.mit.edu) Outside the US: garbo.uwasa.fi:/pc/arcutil/zcrypt10.zip ftp.win.tue.nl:/pub/compression/zip/zcrypt10.zip ftp.inria.fr:/system/user/zcrypt10.zip ftp.informatik.tu-muenchen.de:/pub/utils/archiver/zcrypt10.zip (mail server at ftp-mai...@ftp.informatik.tu-muenchen.de) zcrypt10.zip is only a complement to the export version of zip 1.0, which can be found on many ftp sites, such as wuarchive.wustl.edu:/packages/compression/zip-1.0-export.zip The pkzip documentation can be found in: wuarchive.wustl.edu:/mirrors/msdos/zip/pkz110eu.exe which is a zip file that the portable unzip can extract.
Path: gmdzi!unido!mcsun!uunet!cs.utexas.edu!utgpu!utzoo!utdoe!generic!pnet91! argonaut From: argon...@pnet91.cts.com (C. Peter Constantinidis) Newsgroups: sci.crypt Subject: Re: Archiver encryption security Message-ID: <1323@generic.UUCP> Date: 31 Dec 91 09:45:04 GMT Sender: r...@generic.UUCP Organization: People-Net [pnet91], Etobicoke, ON Lines: 13 Why worry? I never use those archiver encryption algorithms anyways. Safer to use something real like DES or RSA, archive it, which makes it harder to decode because the info is all compressed, etc. (the bits are in a different neat order anyways), and just put a password on the archive.. A decryptor would need to manually decipher the password, then uncompress the file, and THEN work at the actual file. It would take a long time and would be a pain. ------------------------------------------------------------------------------ | INET: argon...@pnet91.cts.com | "My computer is better than your computer!" | ------------------------------------------------------------------------------
Path: gmdzi!unido!mcsun!uunet!cs.utexas.edu!utgpu!utzoo!utdoe!generic! pnet91!marekp From: mar...@pnet91.cts.com (Marek Pawlowski) Newsgroups: sci.crypt Subject: Re: Archiver encryption security Message-ID: <1324@generic.UUCP> Date: 31 Dec 91 16:00:05 GMT Sender: r...@generic.UUCP Organization: People-Net [pnet91], Etobicoke, ON Lines: 55 argon...@pnet91.cts.com writes: >Why worry? I never use those archiver encryption algorithms anyways. >Safer to use something real like DES or RSA, archive it, which makes >it harder >to decode because the info is all compressed, etc. (the bits are in a >different neat order anyways), and just put a password on the >archive.. The poor english makes this hard to understand, and contorts the message Peter was attempting to convey. Common practise is to prepare a file by first archiving it, be it TAR, or some other utility such as LZH. And encrypt the resulting file using a more secure encryption scheme such as RSA, or DES. RSA and DES have proven to be extremely hard to attack (however, I'd like to see two Israeli's prove me wrong). Where as the encryption included with commercial or semi-commercial packages is questionable, and in most cases, reversable. >A decryptor would need to manually decipher the password, then >uncompress the >file, and THEN work at the actual file. I think what he's trying to refer to, is encrypting a file BEFORE you archive it, leaving the task of uncompressing, and THEN decrypting the files in the archive. If this is what he's trying to say, I agree with the following statement: >It would take a long time and would be a pain. It is always a quicker process to encrypt a smaller file, than a larger one. Why waste time, if you're not gaining as much anyway? On top of that, using the above method would give a cracker more samples to decrypt from, all using the same key. This would increase the probability of a successful crack. The smaller the sample, the less chance it will be broken. >----------------------------------------------------------------------------- >| INET: argon...@pnet91.cts.com | "My computer is better than your >computer!" | > > >----------------------------------------------------------------------------- ..Not if it's a Mac.. :) Marek Pawlowski - mar...@pnet91.cts.com, mar...@cerf.net Ph: (416) 884-4501. Inquisitive computer enthusiast.