Mutation
Mutation
Mutation
-------------------------------------------------------------------------------
INTRODUCTION:
------------
Mutation was written with the Hacker, Phreaker, Pirateer and Almost-Average
Joe in mind. Its purpose is to extend highly secure cryptographic systems
to the end user of the program. This program uses a modified National
Bureau of Standards DES (Data Encryption Standard) algorithm to achieve
this purpose. Along with the normal Electronic Code Book cipher there is
also the option of creating a Block-Chained cipher.
BRIEFING:
---------
C:>
OK, so now you have this nice file called TELEPHONE.DOC which looks
so messed up, if you didn't know better, you'd swear its the face of
your neighbors crack-smoking child.
So, after an amount of time elapses you decide you need a telephone
number out of that file. No problem. Enter:
C:>
Now, you can read TELEPHONE.DEC and get the phone number you need.
But, if you noticed, I used a DIFFERENT filename for DECRYPTING the
file. The reason for this is just in case I fucked up the KEY and
it OVERWROTE my encrypted file with the incorrect decrypting KEY.
So when I check out telephone.dec and see that it is FINE! I can then
rename telephone.doc to something else, copy some bullshit file over
its place, then erase it. See that way no one will be able to match
your enciphered text with your deciphered text and figure out your key.
See how easy it was?!
The Cipher Block Chaining option is a little bit different from the
ECB option, not to mention a bit more secure(See TECHNICAL SPECS.& NOTES).
CBC requires you to enter TWO passwords(KEYS). Lets say we wish to use
CBC on a file called TECHNOTE.DOC, we will use
"everyonewantstobeabigshottheres" & "toomanychiefsandnotenoughindians"
as the two passwords. We will output our ciphered-text to a file called
TECHNOTE.DOC
C:> M + <cbc> everyonewantstobeabigshottheres toomanychiefsandnotenoughindians
<technote.doc> technote.doc
C:>
Notice that all that text overran the current line and splashed down
onto the next. This is NO PROBLEM. Mutation will use up the WHOLE
command line for incoming keys/filename etc... So if you have a pretty
long password/s don't worry about it wrapping over, just be sure to
leave enough room for the filenames. NOTE: Names without extensions
(IE ibmbios. ) ARE valid in Mutation.
Ok, so you have this NICE enciphered text. I bet you would like to
read it later huh?! Well, remember your KEYS, else your screwed.
Ok, LETS DECRYPT!
C:>
Thats how its done. No problem huh?! Once you verify that technote.dec
came out correctly be sure to overwrite/rename/etc. the encrypted
ciphertextfile before going on.
So you ask, "Is DES crackable?" Well from a time standpoint, YES.
But before you say "WHAT? I thought NO ONE could read it!" lets ask these
questions:
If DES keys were tested at the rate of one per 60 microseconds, the
key trial would require in excess of 68,000 years. However, as critics
are quick to point out: Massive parallelism and pipelining, the time to
recover a key can be reduced to any value. In a pre-calculated scenario
properly combining precomputation, a machine can be constructed that
would recover the key with high probability in one day. The estimates
of the cost are $5,000,000 with a precomputation time of 2 years.
Even if these estimates are accepted, the way DES would normally be
used, with Cipher-Block Chaining & Initial chaining value, would negate
the advantage gained in the time-memory tradeoff. Thusly, it is VERY
questionable if any organization would risk an investment of 5 million
dollars and two years of precomputation under these circumstances.
So really, your ciphers are very safe.
TRAPDOOR THEORY:
----------------
Some critics of DES are leery about the methods of analysis used
by IBM to validate the DES, and all such methods used by the National
Security Agency, have been [CLASSIFIED] by the U.S. Government.
Therefore, some critics have inferred that one cannot be sure that the
statements by IBM and NSA about DES are as claimed. You see, the
National Security Agency advised the designers that certain design
criteria were considered by the agency to be sensitive. IBM was
requested not to publish the selection criteria. Critics have
suggested that special properties might have been incorporated into
the design of the substitutions and permutations (aka Trap Doors)
which would give a cryptanalytic advantage to a knowledgeable
party. No proof can be offered to refute the existence of trap
doors. Even if IBM, the National Bureau of Standards, or the
National Security Agency were to reveal the criteria, there would
undoubtedly be critics who would suggest that not all were revealed.
The BOTTOM LINE is that after nearly 11 years of scrutiny, no
viable method of cryptanalyzing DES has been discovered and published.
Bell Telephone Laboratories & the Lexar Corporation examined the
properties of the substitutions and permutations. While the Lexar
Corporation reported some "peculiar" properties of the substitution
boxes, to date, no feasible cryptanalytic for DES has been found.
To keep the public happy, the Senate Committee on Intelligence
conducted an investigation into the matter. The following summarizes
the conclusions that were reached:
1. DES is more than adequate for its
intended applications.
2. IBM invented and designed DES.
3. NSA did not tamper with the design.
4. NSA certified that the DES was free
of any known statistical/mathematical
weakness.
5. NSA recommended that the Federal
Reserve Board use DES for electronic
funds transfer applications.
PASSWORD LENGTH:
----------------
The LARGER the password you use, the STRONGER the ciphertext becomes.
So a 118 character password is MUCH better than a 70 character password.
However, in Block Chaining, having two 56 character passwords are even
STRONGER than one 118 character password.
I'm sure you can think of other things to write about, like maybe
your first screw, but that may too personal, incase someone breaks it.
ALSO make sure you PROPERLY dispose of the ENCRYPTED filename, that
you just decrypted. First copy a file over, then another, then to be
safe, copy another, then rename the fucker, THEN erase the SOB.
CONCLUSION:
-----------
Anyhow, greets go out to: All X Legion of Doom members hanging out
and around, P/H/A & Doctor Dissector (KC3.0 is the BEST!), Prometheus,
Sir Hackalot, Ex-Phortune 500s UNITE!, Shawn-Da-Lay Productions -
Wheres the NEW version of Telix Hacker?!!, Brew Associates Where RU?,
L.E. Pirate(What happened to Dragonfire?!oh no)(What Cult of the Dead
Cow?), The Rebel(716), 2600 Magazine(About time I get that damn
subscription information-1.5 months later), Phrack Magazine, Mondo 2000
Magazine (Wheres my subscription fuckers?), Twisted Sector, The Ranger,
The Viper, Slavelord, and all the others who give me phree file points...
Not that I am partial to people who give me free points or anything.(haha)
Anyhow, this ends this SUMMERs(1991) IBM program release schedule for
me. Hopefully, you will see something from me sometime soon, other than
updates to this and CNA Inquiry.
- Professor Falken
= Ex-Legion of Doom!
= Ex-Phortune 500