Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

crypt (Unix)

From Wikipedia, the free encyclopedia
This article is about the Unix encryption utility. For the password hash function, seeCrypt (C).
crypt
Original author(s)Robert Morris
Developer(s)AT&T Bell Laboratories
Initial releaseFebruary 1973; 52 years ago (1973-02)
Operating systemUnix,Unix-like,Inferno
TypeCommand

InUnix computing,crypt orenigma is autility program used for encryption. Due to the ease of breaking it, it is considered to be obsolete.

The program is usually used as afilter, and it has traditionally been implemented using a "rotor machine"algorithm based on theEnigma machine. It is considered to becryptographically far too weak to provide any security againstbrute-force attacks by modern, commoditypersonal computers.[1]

Some versions of Unix shipped with an even weaker version of thecrypt(1) command in order to comply withcontemporaneous laws and regulations that limited the exportation of cryptographic software. Some of these were simply implementations of theCaesar cipher (effectively no more secure thanROT13, which is implemented as a Caesar cipher with a well-known key).

History

[edit]

CryptographerRobert Morris wrote aM-209-basedcrypt, which first appeared inVersion 3 Unix, to encourage codebreaking experiments; Morris managed to breakcrypt by hand.Dennis Ritchie automated decryption with a method byJames Reeds, and a new Enigma-based version appeared inVersion 7, which Reeds andPeter J. Weinberger also broke.[2]

crypt(1) under Linux

[edit]

Linux distributions generally do not include a Unix compatible version of thecrypt command. This is largely due to a combination of three major factors:

  1. crypt is relatively obscure and rarely used for e-mail attachments nor as a file format
  2. crypt is considered to be cryptographically far too weak to withstand brute-force attacks by modern computing systems (Linux systems generally ship withGNU Privacy Guard which is considered to be reasonably secure by modern standards)
  3. During the early years of Linux development and adoption there was some concern that even as weak as the algorithm used bycrypt was, that it might still run afoul ofITAR's export controls;[citation needed] so mainstream distribution developers in theUnited States generally excluded it,[citation needed] leaving their customers to fetch GnuPG or other strong cryptographic software from international sites, sometimes providing packages or scripts to automate that process.

The source code to several old versions of thecrypt command is available in The Unix Heritage Society's Unix Archive.[3] The recent crypt source code is available in theOpenSolaris project. Apublic domain version is available from the Crypt Breaker's Workbench.

Enhancedsymmetric encryption utilities are available for Linux (and should also beportable to any otherUnix-like system) includingmcrypt andccrypt.[4] While these provide support for much more sophisticated and modern algorithms, they can be used to encrypt[5] and decrypt files which are compatible with the traditionalcrypt(1) command by providing the correct command line options.

Breaking crypt(1) encryption

[edit]

Programs for breaking crypt(1) encryption are widely available. Bob Baldwin'spublic domain Crypt Breaker's Workbench, which was written in 1984-1985, is an interactive tool that provides successive plaintext guesses that must be corrected by the user. It also provides a working crypt(1) implementation used by modern BSD distributions.[6]

Peter Selinger's unixcrypt-breaker uses a simple statistical model similar to a dictionary-attack that takes a set of plain texts as input and processes it to guess plausible plaintexts, and does not require user interaction.[7]

Relationship to password hash function

[edit]

There is also a Unixpassword hash function with the same name,crypt. Though both are used for securing data in some sense, they are otherwise essentially unrelated. To distinguish between the two, writers often refer to the utility program ascrypt(1), because it is documented in section 1 of the Unixmanual pages, and refer to the password hash function ascrypt(3), because its documentation is in section 3 of the manual.

See also

[edit]

References

[edit]
  1. ^crypt(1) – FreeBSD General CommandsManual
  2. ^McIlroy, M. D. (1987).A Research Unix reader: annotated excerpts from the Programmer's Manual, 1971–1986(PDF) (Technical report). CSTR. Bell Labs. 139.
  3. ^"Unix Archive Sites".TUHS.
  4. ^Peter Selinger:ccrypt. Retrieved July 27, 2008.
  5. ^FUD Crypter
  6. ^Baldwin, Bob (1985–1994)."Crypt Breaker's Workbench". Archived fromthe original on 2011-08-18.
  7. ^Peter Selinger:unixcrypt-breaker. Retrieved July 27, 2008.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Crypt_(Unix)&oldid=1241009981"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp