ben@hpcvlx.HP.COM (Benjamin Ellsworth) (03/11/88)
I am not a DES expert, no not even close. I am appealing to those who might be. I have a document with troff format commands imbedded in it. I have the troff output. I had encrypted the file using UN*X crypt. Now I cannot remember the password. Does having the vast majority of the plaintext available make the decryption easier? Easy enough to try it? ---------- Benjamin Ellsworth ...hplabs!hpcvlx!ben
gwyn@brl-smoke.ARPA (Doug Gwyn ) (03/12/88)
In article <3350001@hpcvlx.HP.COM> ben@hpcvlx.HP.COM (Benjamin Ellsworth) writes: >I have a document with troff format commands imbedded in it. I have >the troff output. I had encrypted the file using UN*X crypt. Now I >cannot remember the password. > >Does having the vast majority of the plaintext available make the >decryption easier? Easy enough to try it? The UNIX "crypt" utility does not use DES; it's based on a junior version of the Hebern machine (a la Enigma). The "Crypt Breaker's WorkBench" (posted to one of the source newsgroups some time during the past year) is up to the task of reconstructing the plaintext given some probable words. It can even do so without probable words, although it takes more work. If you don't have CBW, perhaps someone knows where you can get it, or contact me by E-mail and we can discuss the options.
jkimble@crash.cts.com (Jim Kimble) (03/13/88)
In article <3350001@hpcvlx.HP.COM> ben@hpcvlx.HP.COM (Benjamin Ellsworth) writes: > >I am not a DES expert, no not even close. I am appealing to those who >the troff output. I had encrypted the file using UN*X crypt. Now I >cannot remember the password. > This is proof positive that you should have taken the password and written it on a pad of paper and kept it in the top drawer of your desk ;-). --Jim Kimble "I used to be into necrophillia, flagellation, and beastiality -- but my friends said I was just beating a dead horse." UUCP: {hplabs!hp-sdd, sdcsvax, nosc}!crash!jkimble ARPA: crash!jkimble@nosc INET: jkimble@crash.CTS.COM