Re: My my, how time flies ...... it's been about "1 hour" -- anyone cracked CryptoSMS yet?
From: \ (jonez_at_norcom.ca)
Date: Wed, 24 Aug 2005 16:43:06 -0600
Joe Peschel wrote:
> " \"- Prof. Jonezę\"" <firstname.lastname@example.org> wrote in
> > Well, it's been about "1 hour" since...
> Has Crypto@S.M.S posted the source code, yet?
Funny, Joe the Blow Asswood didn't mention anything
about needing any "source code" to crack the messages.
From: "Joseph Ashwood" <email@example.com>
Subject: Re: crypto sms
NNTP-Posting-Date: Wed, 22 Jun 2005 00:23:37 EDT
Organization: SBC http://yahoo.sbc.com
Certainly. Assuming a common passphrase length of around 20 characters, and
assuming it is English, this will have 20-30 bits of entropy, MD5 will be
enough to uniquely identify each of these, and MD5 can be effectively
reversed under these circumstances in under 1 hour. This will yield the
entire original passphrase, leading immediately to a complete compromise. So