jwashbur@whittman-hart.com
Wed, 14 Oct 1998 09:25:26 -0500
The known text attack by Eli Biham and Paul C. Kocher mentioned in:
http://www.uneedus.com/~dave/public/pkzip-crack.txt
is devastatingly effective on PKZip archives made with version 1.10.
>From the APPNOTE.TXT:
general purpose bit flag: (2 bytes)
Bit 0: If set, indicates that the file is encrypted.
(For Method 6 - Imploding)
Bit 1: If the compression method used was type 6,
Imploding, then this bit, if set, indicates
an 8K sliding dictionary was used. If clear,
then a 4K sliding dictionary was used.
Bit 2: If the compression method used was type 6,
Imploding, then this bit, if set, indicates
an 3 Shannon-Fano trees were used to encode the
sliding dictionary output. If clear, then 2
Shannon-Fano trees were used.
What is not mentioned, but easily determined by examining the compressed
data streams
with a hex editor, is that the Shannon-Fano trees used are static. There
are 3 possible trees.
The actual tree used can be determined by bits 1 and 2. These trees insure
that the first
15-23 bytes of the compressed stream are known. The tree, coupled with the
High word of
the CRC in the IV, provide a sufficiently large sample of known compressed
data to
employ the Kocher/Biham attack on the 96-bit internal state of the PKZip
encryption engine.
The above is only valid for version 1.1 PKZip files.
In Liberty,
John Washburn
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:15:21