home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.compression
- Path: sparky!uunet!stanford.edu!nntp.Stanford.EDU!kocherp
- From: kocherp@leland.Stanford.EDU (Paul Carl Kocher)
- Subject: Re: List of known bugs for pkzip2.04 please..
- Message-ID: <1993Jan12.003311.19384@leland.Stanford.EDU>
- Keywords: pkzip bugs
- Sender: news@leland.Stanford.EDU (Mr News)
- Organization: DSG, Stanford University, CA 94305, USA
- References: <ksiew.726534504@munagin> <1993Jan11.025634.28694@csc.ti.com> <3575@accucx.cc.ruu.nl>
- Date: Tue, 12 Jan 93 00:33:11 GMT
- Lines: 21
-
- In article <3575@accucx.cc.ruu.nl> nevries@accucx.cc.ruu.nl (Nico E de Vries) writes:
- >The PKZIP 1.10 AV system is very easy to crack (many tools are available
- >for this purpose). Therefore it is useless and meaningless to support them.
- >BTW The new AV scheme has been reported to even weaker. See sci.crypt for
- >more information. The ARJ security envelope has been cracked as well BTW.
- >IMO only HPACK has a proper AV implementation. (it uses RSA)
-
- Actually, some aspects of the new AV algorithm are quite a bit better
- than the old one, and I don't think any parts of it are actually
- weaker (although neither is adequate). Unless I missed a post to
- sci.crypt about the matter, I don't think anyone has posted specific
- information about how to take advantage of the problem (and I hope
- that, at least until PKWARE has time to improve the situation, nobody
- will).
-
- -- Paul Kocher
-
- ________Paul C. Kocher, Box 13554, Stanford, CA 94309, 415/497-6589_________
- kocherp@leland.stanford.edu (preferred), root@kocher.stanford.edu. Contract
- programming work sought (PC assembly, security, etc) -- write/call for info.
-
-