Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Mutation

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 7

-------------------------------------------------------------------------------

MUTATi0N: Cryptography for Hackers/Phreakers & Others


=====================================================

Version 1.00, Released 7/27/91

Written By Professor Falken


Copyright (c) 1991

-------------------------------------------------------------------------------

INTRODUCTION:
------------
Mutation was written with the Hacker, Phreaker, Pirateer and Almost-Average
Joe in mind. Its purpose is to extend highly secure cryptographic systems
to the end user of the program. This program uses a modified National
Bureau of Standards DES (Data Encryption Standard) algorithm to achieve
this purpose. Along with the normal Electronic Code Book cipher there is
also the option of creating a Block-Chained cipher.

I decided to write THIS program because I felt there was an inadequate


supply of encryption utilities out there. Let me explain, the encryption
utilities that were in the public domain (Shareware & Copyrighted)
either employed insecure encryption algorithms or the key (password)
length was much too short to make cracking it hard. Take Central Point
Software's "PC-Secure" for example. PC-Secure employs NBS's DES algorithm
but the key length is limited to 32 characters. While the DES standard
is safe, a key length of 32 is not all that secure. Not to mention that
I'm sure Central Point Software put some type of backdoor in the program
just in case SOMEONE made a ciphertext that NEEDED to be deciphered via
abnormal means. Another SHAREWARE utility is "The Private Line" the only
thing private about the ciphers this program makes is they won't be able
to be read your cat. The Private Line employs DES, however, their key
length is a miserable 16 characters long. I think my 486-33 could bust
these ciphers in a matter of weeks. Unlike these previous programs, and
the hordes of other programs which follow in their footsteps, I am proud
to release a highly secure, command-lined, low memory overhead, and
portable cryptographic tool.

BRIEFING:
---------

Mutation has a possible key length of 118 characters for Electronic


Code Book mode, and 56 characters per KEY for Cipher Block Chaining's
2 key requirement. Not to mention there are NO known trapdoors written
into this program. As for the DES algorithm, thats another story
(See:TRAPDOOR THEORY).

Mutation can be used in Electronic Code Book mode, which is the


default mode if no options are specified, and a Cipher Block Chaining
mode. The ECB(Electronic Code Book) mode uses only ONE key. A key
is the password that you want to use to encrypt & thusly also decrypt
the file with. While ECB only uses ONE password, CBC(Cipher Block
Chaining) uses TWO passwords to encrypt the file with.
The files you wish to encrypt can be really anything. A list of
telephone numbers, friends names, passwords for various systems,
technical notes, where you hid the dead body etc. You can really
encrypt anything. However, I would recommend at this time to stay
away from encrypting EXE & COM files. There is a small bug in the
program which will add a few bytes to the end of each file. While
this will not effect the output of an ASCII file, it may mess up an
EXE/COM file. I hope to fix this bug in upcoming versions.

USING THE ECB OPTION:


-----------------------

In order to invoke the ECB option (default) of Mutation, all that


is needed is knowing whether you wish to ENcrypt(+) or DEcrypt(-) the
file, what password(KEY) you wish to use, and the INCOMING filename
and what the OUTGOING filename should be. For instance, I wish to ENCRYPT
a file called TELEFONE.DOC, I will use "fatcuntwhorecumbelchinggutterslut"
as my password. I suppose I will output the ENCRYPTED text to a file called
TELEFONE.DOC . You see, this makes sure that the original text is
OVERWRITTEN and never seen again. Here's how its done:

C:> m + fatcuntwhorecumbelchinggutterslut <telephone.doc> telephone.doc

C:>
OK, so now you have this nice file called TELEPHONE.DOC which looks
so messed up, if you didn't know better, you'd swear its the face of
your neighbors crack-smoking child.

So, after an amount of time elapses you decide you need a telephone
number out of that file. No problem. Enter:

C:> M - fatcuntwhorecumbelchinggutterslut <telephone.doc> telephone.dec

C:>
Now, you can read TELEPHONE.DEC and get the phone number you need.
But, if you noticed, I used a DIFFERENT filename for DECRYPTING the
file. The reason for this is just in case I fucked up the KEY and
it OVERWROTE my encrypted file with the incorrect decrypting KEY.
So when I check out telephone.dec and see that it is FINE! I can then
rename telephone.doc to something else, copy some bullshit file over
its place, then erase it. See that way no one will be able to match
your enciphered text with your deciphered text and figure out your key.
See how easy it was?!

USING THE CBC OPTION:


---------------------
< NOTE: CBC IS NOT AVAILABLE IN VERSION 1.00 OF MUTATi0N >
< COMING VERSIONS WILL HAVE CIPHER BLOCK CHAINING ENABLED >

The Cipher Block Chaining option is a little bit different from the
ECB option, not to mention a bit more secure(See TECHNICAL SPECS.& NOTES).
CBC requires you to enter TWO passwords(KEYS). Lets say we wish to use
CBC on a file called TECHNOTE.DOC, we will use
"everyonewantstobeabigshottheres" & "toomanychiefsandnotenoughindians"
as the two passwords. We will output our ciphered-text to a file called
TECHNOTE.DOC
C:> M + <cbc> everyonewantstobeabigshottheres toomanychiefsandnotenoughindians
<technote.doc> technote.doc

C:>
Notice that all that text overran the current line and splashed down
onto the next. This is NO PROBLEM. Mutation will use up the WHOLE
command line for incoming keys/filename etc... So if you have a pretty
long password/s don't worry about it wrapping over, just be sure to
leave enough room for the filenames. NOTE: Names without extensions
(IE ibmbios. ) ARE valid in Mutation.

Ok, so you have this NICE enciphered text. I bet you would like to
read it later huh?! Well, remember your KEYS, else your screwed.
Ok, LETS DECRYPT!

C:> M - <cbc> everyonewantstobeabigshottheres toomanychiefsandnotenoughindians


<technote.doc> technote.dec

C:>
Thats how its done. No problem huh?! Once you verify that technote.dec
came out correctly be sure to overwrite/rename/etc. the encrypted
ciphertextfile before going on.

TECHNICAL SPECIFICATIONS & NOTES:


---------------------------------

The Data Encryption Standard Algorithm was conceived by IBM


in 1977 and was adopted by the National Bureau of Standards as
the nations Encryption Standard. The Data Encryption Standard
Algorithm is a block cipher that enciphers identical eight-byte
plaintext blocks into identical eight-byte ciphertext blocks.
Or more technically: it transforms an input block (file) into a
string of output bits of fixed length(output file). The
enciphering/deciphering functions are such that every bit in the
output block depends jointly on every bit in the input block and
on every bit in the password. This DES algorithm is also known
as the Electronic Code Book (ECB).

Certain files exhibit great regularity, with many identical


eight-byte blocks (for example, a memorandum always begins with
TO: ). Normally under ECB encipherment, such identical blocks
of plaintext yield identical blocks of ciphertext (when using
the same key). Repetitions of some other blocks may also be
visible; for example, telephone numbers in the plain text when
aligned with the eight-byte DES blocks, can be recognized as
identical in the ciphertext. It is doubtful whether this
phenomenon is a serious weakness: to date no technique has been
found which uses it to determine the password or obtain usable
plain text of alphabetic/numeric files. However, if the existence
of identical blocks can be concealed, a cryptographic system is
strengthened at least intuitively, because the amount of information
available to the cracker is reduced. This is where Cipher Block
Chaining comes in handy.

By using Mutation's Cipher Block Chaining option it is possible


to use DES in such a manner that identical eight-byte plaintext
blocks virtually always yield different ciphertext blocks, without
altering the security of the existing algorithm. Thusly if you are
encrypting a file that has a lot of repetition (IE- Indented source
code, Spreadsheet, Listing) please use CBC to strengthen the code.
However, as in life for every GOOD there is an EVIL, the CBC is
easily cryptanalyzed on the basis of a moderate amount of ciphertext.
You see, from enough enciphered short blocks, a cryptanalyst could
recover the key, and then decipher each individual short blocks.
But, I am not here to analyze various cipher systems, I'm here to
teach the use of this product.

CRYPTANALYSIS OF THE DES ALGORITHM:


-----------------------------------

So you ask, "Is DES crackable?" Well from a time standpoint, YES.
But before you say "WHAT? I thought NO ONE could read it!" lets ask these
questions:

1. Is it reasonable to assume that an opponent can obtain the


required information to decipher the ciphertext. (IE-Finding them
written down, extracting them from your head, etc.)
2. What is the computational COST of the attack?
(IE- How much manpower, fast enough computing facilities etc..)
3. How much time does it require?
(Can my opponent wait 30,000 years for the cracking of my text?)

So it while it is TRUE that someone will be able to read your


ciphertext, I really don't think they will care 10,000 years from now
anyhow. But, just for the hell of it lets make a worst case hypothetical
situation(I hate them). First, lets assume you have made a CBC cipher
with two keys 55 characters per key. Second off, we MUST assume, that
for some reason you have pissed off the WRONG people in the government
(namely the people that effectively OWN the modified Cray Y-MP that
the National Security Agency has) and they deem it necessary that they
devote 100% of the computing resources to cracking your file. Third,
we must assume your DEAD else, they would have used sodium-penathol
a long time ago to get the KEY from you. Fourth- These government
people plan on having their jobs AFTER the current administration leaves
the White House. If all these pre-conditions are met, WELL, your up
chunky-shit creek without a paddle. Because probably in 3-4 years
they will have deciphered it.

If DES keys were tested at the rate of one per 60 microseconds, the
key trial would require in excess of 68,000 years. However, as critics
are quick to point out: Massive parallelism and pipelining, the time to
recover a key can be reduced to any value. In a pre-calculated scenario
properly combining precomputation, a machine can be constructed that
would recover the key with high probability in one day. The estimates
of the cost are $5,000,000 with a precomputation time of 2 years.
Even if these estimates are accepted, the way DES would normally be
used, with Cipher-Block Chaining & Initial chaining value, would negate
the advantage gained in the time-memory tradeoff. Thusly, it is VERY
questionable if any organization would risk an investment of 5 million
dollars and two years of precomputation under these circumstances.
So really, your ciphers are very safe.

TRAPDOOR THEORY:
----------------
Some critics of DES are leery about the methods of analysis used
by IBM to validate the DES, and all such methods used by the National
Security Agency, have been [CLASSIFIED] by the U.S. Government.
Therefore, some critics have inferred that one cannot be sure that the
statements by IBM and NSA about DES are as claimed. You see, the
National Security Agency advised the designers that certain design
criteria were considered by the agency to be sensitive. IBM was
requested not to publish the selection criteria. Critics have
suggested that special properties might have been incorporated into
the design of the substitutions and permutations (aka Trap Doors)
which would give a cryptanalytic advantage to a knowledgeable
party. No proof can be offered to refute the existence of trap
doors. Even if IBM, the National Bureau of Standards, or the
National Security Agency were to reveal the criteria, there would
undoubtedly be critics who would suggest that not all were revealed.
The BOTTOM LINE is that after nearly 11 years of scrutiny, no
viable method of cryptanalyzing DES has been discovered and published.
Bell Telephone Laboratories & the Lexar Corporation examined the
properties of the substitutions and permutations. While the Lexar
Corporation reported some "peculiar" properties of the substitution
boxes, to date, no feasible cryptanalytic for DES has been found.
To keep the public happy, the Senate Committee on Intelligence
conducted an investigation into the matter. The following summarizes
the conclusions that were reached:
1. DES is more than adequate for its
intended applications.
2. IBM invented and designed DES.
3. NSA did not tamper with the design.
4. NSA certified that the DES was free
of any known statistical/mathematical
weakness.
5. NSA recommended that the Federal
Reserve Board use DES for electronic
funds transfer applications.

So if there is a TRAPDOOR or not, I really doubt they would risk


releasing of their trapdoor to the public & intelligence community
at large just to decipher some piss on the wall hackers file (Their
point of view).

PASSWORD LENGTH:
----------------

In the past there has been a tendency among users of cryptographic


systems to use a word or a name as a key. Today this procedure is
VERY unsafe. There are a fewer than a million words in an unabridged,
and fewer than a million names in the largest telephone directory.
That number of potential keys could be tested in a few minutes on a
powerful computer of today. Even the use of eight randomly chosen
ASCII characters is unsafe. If a DES key is introduced directly,
it should consist of 32 or MORE ASCII characters
(IE-A-Z,a-z,0-9,and punctuation, and ALT-key combinations). You see
by having Mutation being able to use 118 bytes of password, the user
might, for example, enter several words chosen randomly and
independently from an unabridged dictionary. Or the user may enter
some phrase from a song or TV commercial. It is essential that these
choices be made in such a way that the key cannot practically be found
by an opponent, either by guesswork or by enumerating some plausible set
of keys.

HINTS & EXTRAS:


---------------
< NOTE: CIPHER BLOCK CHAINING (CBC) IS NOT AVAILABLE FOR >
< VERSION 1.00 OF MUTATi0N, FURTHER RELEASES WILL FIX THIS >

Mutation in ECB mode can use KEYS up to 118 characters in length. In


CBC mode, it can use TWO KEYS, with a maximum of 56 characters per key.
That is assuming your using one letter filenames. Example:
C:> m + <cbc> passwordOne passwordTwo <A> B
This would give you A. as your input file and B. as your output file.

The LARGER the password you use, the STRONGER the ciphertext becomes.
So a 118 character password is MUCH better than a 70 character password.
However, in Block Chaining, having two 56 character passwords are even
STRONGER than one 118 character password.

For the STRONGEST ciphertext possible, I suggest using Cipher-Block


Chaining, with 56-char. passwords. Note, that you could use a
100-character password for KEY1 and a 18 character password for KEY2.
Or a 34-character password for KEY1 and an 84-character password for KEY2.
Just realize that the numbers can be swapped around, and just make sure
its as long as possible for the STRONGEST text.

Sometimes making the LONG password is about as much bother as it


will be for someone trying to break it. Here are some ideas for
making up these LONG keys:
1. Sentences from books.
2. Phrases from obscure songs.
3. TV/Radio Commercials.
4. A column from an old newspaper.
5. Make up a short story.
6. Make faces with the ASCII chars. :0 :) ;) etc.

I'm sure you can think of other things to write about, like maybe
your first screw, but that may too personal, incase someone breaks it.

ALSO make sure you PROPERLY dispose of the ENCRYPTED filename, that
you just decrypted. First copy a file over, then another, then to be
safe, copy another, then rename the fucker, THEN erase the SOB.

It would also be nice to have this program setup in your PATH.


So that you can encipher stuff all over your harddrive! When the nice
men in jackets come to borrow your computer don't let them have all
your data that easily.

CONCLUSION:
-----------

This documentation is A LOT longer than I intended it to be. In fact


I shouldn't have written all that, I probably confused a lot of the
readers. Oh well, you should be able do discern how to run the thing
from the previous text and the small example built into the program.

I would now like to thank Legions of Lucifer-Phuck for releasing


this product on their intercontinental distribution system. I really
helps a program when it has access to a WIDE dispersal network. Again,
thanks LoL-PHUCK.

Earlier, I mentioned 'portability' of this code. The code is in 'C'


and is quite portable, but I am not releasing the code for various
reasons. First, there is the possibility that someone will be able to
figure out how the DES code was modified by myself, and secondly
I plan to release this on AMIGA & MAC computers. I plan on having the
AMIGA version out sometime in the summer of 91'. The MAC will have
to wait a few more months.

Anyhow, greets go out to: All X Legion of Doom members hanging out
and around, P/H/A & Doctor Dissector (KC3.0 is the BEST!), Prometheus,
Sir Hackalot, Ex-Phortune 500s UNITE!, Shawn-Da-Lay Productions -
Wheres the NEW version of Telix Hacker?!!, Brew Associates Where RU?,
L.E. Pirate(What happened to Dragonfire?!oh no)(What Cult of the Dead
Cow?), The Rebel(716), 2600 Magazine(About time I get that damn
subscription information-1.5 months later), Phrack Magazine, Mondo 2000
Magazine (Wheres my subscription fuckers?), Twisted Sector, The Ranger,
The Viper, Slavelord, and all the others who give me phree file points...
Not that I am partial to people who give me free points or anything.(haha)

And for EVERYONE who I left out- YOU TOO!

Anyhow, this ends this SUMMERs(1991) IBM program release schedule for
me. Hopefully, you will see something from me sometime soon, other than
updates to this and CNA Inquiry.

Programs released to date:


1. Automated CNA Finder (1989)
2. Phreak Tools v1.x (1989)
3. CNA Inquiry v2.x (1991)
4. MUTATi0N v0.x Beta (1991)

- Professor Falken
= Ex-Legion of Doom!
= Ex-Phortune 500

MUTATi0N - Version 1.00


Conceived & Written by Professor Falken 6/91
Copyright (c) 1991 Released by Legions of Lucifer-Phuck
#

You might also like