Penetration Testing mailing list archives

Re: Cryptographic Functions


From: David Howe <DaveHowe.Pentest () googlemail com>
Date: Wed, 19 Aug 2009 15:19:10 +0100

M.D.Mufambisi wrote:
Hello people.

1. When a passphrase is used a key in symetric cryptography, how does
the pass phrase map to the key in an algorithm like AES? ie....how
many letters correspond to 1 bit? etc?

That is undefined. AES uses a key of fixed size (ok, you can choose the
key size, but within those constraints) but how you get from an ascii
string to a binary key is not part of the definition. In most cases
though, its a simple hash, or minor variation thereof.


------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT 
and CEPT certs require a full practical examination in order to become certified. 

http://www.iacertification.org
------------------------------------------------------------------------


Current thread: