[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: IPG cracked with known plaintext



At 05:32 PM 3/19/96 GMT, ECafe Anonymous Remailer wrote:
>This information is preliminary and is based on an attempt to
>understand the IPG algorithm information.  That description is not
>clear in some areas, however, hence this analysis is tentative at this
>time.
>
>First let us describe the IPG system in more conventional C:
>
>a[0] to a[63] are initialized to random 8-bit values.  (The
>description is unclear and almost makes it sound like they are
>initialized to a random 8-bit value anded with 0x3500, which would of
>course be zero.  The attack below will assume that this bizarre step
>is not done, but will still apply even if it is.)
>

I think they mean ADD not AND but it's still an odd thing to do IMHO.


>So this algorithm is easily broken with known plaintext.
>
>
Agreed.   Given that most PC apps generate known headers on files
and that only a smallish plaintext is needed it's looks rather weak.

John Pettitt, [email protected]
VP Engineering, CyberSource Corporation, 415 473 3065
 "Technology is a way of organizing the universe so that man
  doesn't have to experience it." - Max Frisch

PGP Key available at:
http://www-swiss.ai.mit.edu/htbin/pks-extract-key.pl?op=get&search=0xB7AA3705