home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!decwrl!pa.dec.com!maria.wustl.edu!mike
- From: mike@maria.wustl.edu
- Subject: Warning: naive question about /etc/passwd encryption
- Message-ID: <9207212043.aa20689@maria.wustl.edu>
- Date: Tue, 21 Jul 92 19:37:36 CDT
- X-Received: by usenet.pa.dec.com; id AA03374; Tue, 21 Jul 92 17:49:22 -0700
- X-Received: by inet-gw-1.pa.dec.com; id AA09806; Tue, 21 Jul 92 17:49:21 -0700
- X-To: sci.crypt.usenet
- Lines: 18
-
-
- I am a complete novice at cryptography and DES and all that stuff.
-
- I have a (somewhat) hypothetical situation here. Suppose I know
- (or guess) that a user uses the same password on two different
- Unix systems and I have access to an unshadowed /etc/passwd.
- Of course, the two encrypted entries for this person's password are
- different on the two machines, but I know that the person uses the
- same password. Does this make it more than twice as likely that I
- could find out what this person's password is armed with this knowledge?
- How does this extend to -- say -- 10 different encryptions on 10
- different systems of the same password?
-
- Please reply by email as my Usenet access is unreliable (and why I am
- using a mail-news gateway to post).
-
- -Mike
- mike@maria.wustl.edu
-