Penetration Testing mailing list archives
Re: Cryptographic Functions
From: "M.B.Jr." <marcio.barbado () gmail com>
Date: Tue, 18 Aug 2009 15:02:20 -0300
Hi, On Tue, Aug 18, 2009 at 12:50 PM, M.D.Mufambisi<mufambisi () gmail com> wrote:
1. When a passphrase is used a key in symetric cryptography, how does the pass phrase map to the key in an algorithm like AES? ie....how many letters correspond to 1 bit? etc?
the passphrase concept is used for asymmetric cryptography, not symmetric. The latter uses the term "password". And it maps to no key since it, as a matter of fact, is the "key". Regards, -- Marcio Barbado, Jr. ============== ============== _bds Labs. "In fact, companies that innovate on top of open standards are advantaged because resources are freed up for higher-value work and because market opportunities expand as the standards proliferate." Scott Handy Vice President Worldwide Linux and Open Source, IBM ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Esta mensagem e qualquer arquivo nela contido é confidencial. "Pratica crime de violação de telecomunicações quem, transgredindo lei ou regulamento, exiba autógrafo ou qualquer documento ou arquivo, divulgue ou comunique, informe ou capte, transmita a outrem ou utilize o conteúdo, resumo, significado, interpretação, indicação ou efeito de qualquer comunicação dirigida a terceiro." (Artigo 56 da Lei n.º 4.117 de 27 de agosto de 1962, aplicável aos crimes em telecomunicações, nos termos do art. 215, I, da Lei 9.472/97). ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ NOTICE This message including any attachments is confidential information of B.D.S. LABS. TECNOLOGIA COMERCIAL LTDA. Disclosure, copying or distribution is prohibited without permission of BDS LABS. If you are not the intended recipient, please reply to the sender and then delete this message. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- Cryptographic Functions M.D.Mufambisi (Aug 18)
- Re: Cryptographic Functions M.B.Jr. (Aug 18)
- Re: Cryptographic Functions Jeffrey Walton (Aug 18)
- Message not available
- Re: Cryptographic Functions M.D.Mufambisi (Aug 19)
- Re: Cryptographic Functions Jeffrey Walton (Aug 19)
- Re: Cryptographic Functions M.D.Mufambisi (Aug 19)
- Re: Cryptographic Functions Steve Friedl (Aug 19)
- Message not available
- Re: Cryptographic Functions David Howe (Aug 19)
- Re: Cryptographic Functions Jan Schejbal (Aug 21)