Search found 8 matches

by damiank
Thu Oct 03, 2013 7:58 pm
Forum: AES Crypt
Topic: Build under cygwin: SOLVED
Replies: 1
Views: 6456

Re: Build under cygwin: SOLVED

There is a way better solution to compile under cygwin...

After un-zipping the archive for the source code, chdir into that directory and edit the Makefile:
nano Makefile

Now, at the top look for the line that says:
#Uncomment the line below to compile on Mac
#LIBS=-liconv

Go ahead and uncomment ...
by damiank
Sat Aug 04, 2012 10:58 am
Forum: AES Crypt
Topic: HMAC verification allowing faster decipher iterations
Replies: 9
Views: 18148

Re: HMAC verification allowing faster decipher iterations

When I started the thread, I was focused primarily on the issue if speed in cracking via brute/dictionary/my generator, against specifically your implementation of AES.

In this same thread, earlier I also pointed out a solution to make the password check take infinitely longer for any brute ...
by damiank
Thu Aug 02, 2012 12:49 am
Forum: AES Crypt
Topic: HMAC verification allowing faster decipher iterations
Replies: 9
Views: 18148

Re: HMAC verification allowing faster decipher iterations

Regarding the strength of the passwords being important, I'm not disputing that at all. But I will bet my life that the majority of the users of your software have passwords I could crack within a month tops. Thats how sure I am. I would also bet that anyone using scrub software has a cached copy of ...
by damiank
Wed Aug 01, 2012 11:53 pm
Forum: AES Crypt
Topic: HMAC verification allowing faster decipher iterations
Replies: 9
Views: 18148

Re: HMAC verification allowing faster decipher iterations

The voip comment was something completely different. Someone will figure it out eventually. Then the flaming will begin. Lets see how long it takes.

Damian Kohlfeld.
by damiank
Wed Aug 01, 2012 11:40 pm
Forum: AES Crypt
Topic: HMAC verification allowing faster decipher iterations
Replies: 9
Views: 18148

AESCrypt basic brute crack 1000x faster, proof here.

Proof of Concept AESCrypt Cracks 1000x faster if it's gonna crack.

True, but, 1000x faster, is still 1000x faster. My argument is very sound. If you have a distributed brute force cluster with FCPGA, or ASIC cards handling the SHA, and a lot of engineering is put into batching, brute force cracking ...
by damiank
Wed Aug 01, 2012 9:31 pm
Forum: AES Crypt
Topic: HMAC verification allowing faster decipher iterations
Replies: 9
Views: 18148

Re: HMAC verification allowing faster decipher iterations

Just wanted to add that the block multiple from the Obfuscator portion would of course be 128bytes.

Depending on the implementation of course, if this was done, the decrypt procedure would pass with flying colors as I've just tested and implemented it myself. No matter what password I enter, I get ...
by damiank
Wed Aug 01, 2012 7:49 pm
Forum: AES Crypt
Topic: Seeking Linux Package Maintainer
Replies: 7
Views: 12811

Re: Seeking Linux Package Maintainer

As long as the project has been around, why not get it into a mainstream extra's repo or something along those lines, I think the license is correct, unless I am missing something. I would start with Fedora and Ubuntu.

As simple as the code is, I cannot imagine it being an issue, there are no ...
by damiank
Wed Aug 01, 2012 6:11 pm
Forum: AES Crypt
Topic: HMAC verification allowing faster decipher iterations
Replies: 9
Views: 18148

HMAC verification allowing faster decipher iterations

One thing I noticed going through the source code. AESCrypt has the ability to quickly verify whether or not the provided password is correct. Now, while being a nice feature, it also presents a significant problem of making the encrypted file far more vulnerable to brute force attack.

Here's why ...