Penetration Testing mailing list archives
Re: Cryptographic Functions
From: David Howe <DaveHowe.Pentest () googlemail com>
Date: Wed, 19 Aug 2009 15:19:10 +0100
M.D.Mufambisi wrote:
Hello people. 1. When a passphrase is used a key in symetric cryptography, how does the pass phrase map to the key in an algorithm like AES? ie....how many letters correspond to 1 bit? etc?
That is undefined. AES uses a key of fixed size (ok, you can choose the key size, but within those constraints) but how you get from an ascii string to a binary key is not part of the definition. In most cases though, its a simple hash, or minor variation thereof. ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- Cryptographic Functions M.D.Mufambisi (Aug 18)
- Re: Cryptographic Functions M.B.Jr. (Aug 18)
- Re: Cryptographic Functions Jeffrey Walton (Aug 18)
- Message not available
- Re: Cryptographic Functions M.D.Mufambisi (Aug 19)
- Re: Cryptographic Functions Jeffrey Walton (Aug 19)
- Re: Cryptographic Functions M.D.Mufambisi (Aug 19)
- Re: Cryptographic Functions Steve Friedl (Aug 19)
- Message not available
- Re: Cryptographic Functions David Howe (Aug 19)
- Re: Cryptographic Functions Jan Schejbal (Aug 21)