There is a way better solution to compile under cygwin...
After un-zipping the archive for the source code, chdir into that directory and edit the Makefile:
nano Makefile
Now, at the top look for the line that says:
#Uncomment the line below to compile on Mac
#LIBS=-liconv
Go ahead and uncomment ...
Search found 8 matches
- Thu Oct 03, 2013 7:58 pm
- Forum: AES Crypt
- Topic: Build under cygwin: SOLVED
- Replies: 1
- Views: 6456
- Sat Aug 04, 2012 10:58 am
- Forum: AES Crypt
- Topic: HMAC verification allowing faster decipher iterations
- Replies: 9
- Views: 18148
Re: HMAC verification allowing faster decipher iterations
When I started the thread, I was focused primarily on the issue if speed in cracking via brute/dictionary/my generator, against specifically your implementation of AES.
In this same thread, earlier I also pointed out a solution to make the password check take infinitely longer for any brute ...
In this same thread, earlier I also pointed out a solution to make the password check take infinitely longer for any brute ...
- Thu Aug 02, 2012 12:49 am
- Forum: AES Crypt
- Topic: HMAC verification allowing faster decipher iterations
- Replies: 9
- Views: 18148
Re: HMAC verification allowing faster decipher iterations
Regarding the strength of the passwords being important, I'm not disputing that at all. But I will bet my life that the majority of the users of your software have passwords I could crack within a month tops. Thats how sure I am. I would also bet that anyone using scrub software has a cached copy of ...
- Wed Aug 01, 2012 11:53 pm
- Forum: AES Crypt
- Topic: HMAC verification allowing faster decipher iterations
- Replies: 9
- Views: 18148
Re: HMAC verification allowing faster decipher iterations
The voip comment was something completely different. Someone will figure it out eventually. Then the flaming will begin. Lets see how long it takes.
Damian Kohlfeld.
Damian Kohlfeld.
- Wed Aug 01, 2012 11:40 pm
- Forum: AES Crypt
- Topic: HMAC verification allowing faster decipher iterations
- Replies: 9
- Views: 18148
AESCrypt basic brute crack 1000x faster, proof here.
Proof of Concept AESCrypt Cracks 1000x faster if it's gonna crack.
True, but, 1000x faster, is still 1000x faster. My argument is very sound. If you have a distributed brute force cluster with FCPGA, or ASIC cards handling the SHA, and a lot of engineering is put into batching, brute force cracking ...
True, but, 1000x faster, is still 1000x faster. My argument is very sound. If you have a distributed brute force cluster with FCPGA, or ASIC cards handling the SHA, and a lot of engineering is put into batching, brute force cracking ...
- Wed Aug 01, 2012 9:31 pm
- Forum: AES Crypt
- Topic: HMAC verification allowing faster decipher iterations
- Replies: 9
- Views: 18148
Re: HMAC verification allowing faster decipher iterations
Just wanted to add that the block multiple from the Obfuscator portion would of course be 128bytes.
Depending on the implementation of course, if this was done, the decrypt procedure would pass with flying colors as I've just tested and implemented it myself. No matter what password I enter, I get ...
Depending on the implementation of course, if this was done, the decrypt procedure would pass with flying colors as I've just tested and implemented it myself. No matter what password I enter, I get ...
- Wed Aug 01, 2012 7:49 pm
- Forum: AES Crypt
- Topic: Seeking Linux Package Maintainer
- Replies: 7
- Views: 12811
Re: Seeking Linux Package Maintainer
As long as the project has been around, why not get it into a mainstream extra's repo or something along those lines, I think the license is correct, unless I am missing something. I would start with Fedora and Ubuntu.
As simple as the code is, I cannot imagine it being an issue, there are no ...
As simple as the code is, I cannot imagine it being an issue, there are no ...
- Wed Aug 01, 2012 6:11 pm
- Forum: AES Crypt
- Topic: HMAC verification allowing faster decipher iterations
- Replies: 9
- Views: 18148
HMAC verification allowing faster decipher iterations
One thing I noticed going through the source code. AESCrypt has the ability to quickly verify whether or not the provided password is correct. Now, while being a nice feature, it also presents a significant problem of making the encrypted file far more vulnerable to brute force attack.
Here's why ...
Here's why ...