Go to Post If this truly bothers you, you should do something CONSTRUCTIVE about it instead of whining about it - Jaine Perotti [more]
Home
Go Back   Chief Delphi > Technical > Programming
CD-Media   CD-Spy  
portal register members calendar search Today's Posts Mark Forums Read FAQ rules

 
Closed Thread
Thread Tools Rate Thread Display Modes
  #1   Spotlight this post!  
Unread 06-01-2005, 20:18
buss buss is offline
Registered User
AKA: Steven
FRC #0180 (S.P.A.M. Robotics)
Team Role: Mentor
 
Join Date: Jan 2004
Rookie Year: 2003
Location: Gainesville, FL
Posts: 50
buss has a spectacular aura aboutbuss has a spectacular aura about
Send a message via AIM to buss
Concerning pdf security

Note to moderators: this is not a thread on how to crack a pdf, it is also not a thread revealing the password of the encrypted pdfs.

The security scheme used by adobe to encrypt pdfs is quite something. A quick read of http://www.totse.com/en/privacy/encryption/162565.html reveals just what goes into encrypting a pdf document. Considering the complexity of last year's key (FEma2X5E10vEir) this year's key will likely be similar. The above key has the following character set: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWX YZ0123456789. That means for the key FIRST is using, there are 62^14 possible combinations. That's 12401769434657526912139264 or 1.24x10^25. On even the fastest consumer level computers, cracking that password through brute force would take months, if not years.
(See, i said its not about how to crack these files!)

Assuming a processor could test 10,000 passwords per second, that equals 600,000 passwords per minute, 1,200,000 passwords per hour, and 864,000,000 passwords per day, 25,920,000,000 passwords per month, and 311,040,000,000 passwords per year. That's only 3.114x10^11 passwords per year! At this rate, cracking the password on a single machine (assuming that only half the possible passwords need to be tested), it would take over 50 years!

(side note: somebody, make sure my math is correct)

Obviously, FIRST has no possible reason to worry about one of us FIRSTers breaking the pre-released PDFs. So all the worrying about moderating the forums to keep the password off is really not needed.

However, there are much more efficient ways to crack this password. I have been looking into pdf security and based off the article i linked above, I know it is possible to retrieve the password hash in a regular hex editor (note that you can see the ASCII password hash in any text editor, its the /U entry). This hash is encrypted with an MD5 encryption scheme (MD5 is no problem to crack if you have an adequate rainbow table, unfortunately that means upwards of 100 gigabytes of precomputed password hashes. That takes a long time, think:each table of hashes on a 2GHz AthlonXP processor takes about 3.5 to 4 days, and there needs to be over 100 tables computed.

After the MD5 hash is cracked, one still needs to decrypt the user password encrypted with RC4. RC4 is a bit of a problem when it comes to decryption. RC4 is a closed source algorithm and there is no commercial or free way to decrypt this, although there was a hashing program released some time ago, i think 1997 but I'm far from sure, that appeared to generate the same results as RC4. Then after doing all of the above, the password is revealed!

Obviously, cracking the 128bit security that FIRST uses on its encrypted PDF is anything but possible. But just because something is impossible, doesn't mean that one shouldn't try. I do encourage everyone with a lot of spare time to analyze the security on PDF (note that its pdf version 1.5, also note that the link above was a spec on pdf version 1.3 and so it might not be correct). Questions or comments, if any, are very much appreciated.

And please, admins, don't delete this thread. As explained, actually cracking the pdfs is impossible (no one has ever cracked the user password) and this thread is merely for entertainment/educational purposes.
__________________
Steven Buss

"Far and away the best prize that life offers is the chance to work hard at work worth doing."
-- Teddy Roosevelt
  #2   Spotlight this post!  
Unread 06-01-2005, 20:41
Unsung FIRST Hero
Mike Betts Mike Betts is offline
Electrical Engineer
no team
Team Role: Engineer
 
Join Date: Dec 2001
Rookie Year: 1995
Location: Homosassa, FL
Posts: 1,442
Mike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond reputeMike Betts has a reputation beyond repute
Re: Concerning pdf security

The issue is not if you could try or not (It's near impossible even if you know there were 14 characters in the key). It's the perception of the public that any of us would try.

Ask yourself if your grandmother would understand that you are doing a futile or intellectual exercise? No... All she knows is that her son or daughter is trying to cheat.

I implore you to stop this madness now... Let this thread die...
__________________
Mike Betts

Alumnus, Team 3518, Panthrobots, 2011
Alumnus, Team 177, Bobcat Robotics, 1995 - 2010
LRI, Connecticut Regional, 2007-2010
LRI, WPI Regional, 2009 - 2010
RI, South Florida Regional, 2012 - 2013

As easy as 355/113...
  #3   Spotlight this post!  
Unread 06-01-2005, 20:44
Tom Bottiglieri Tom Bottiglieri is offline
Registered User
FRC #0254 (The Cheesy Poofs)
Team Role: Engineer
 
Join Date: Jan 2004
Rookie Year: 2003
Location: San Francisco, CA
Posts: 3,186
Tom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond reputeTom Bottiglieri has a reputation beyond repute
Re: Concerning pdf security

Quote:
Originally Posted by Mike Betts
The issue is not if you could try or not (It's near impossible even if you know there were 14 characters in the key). It's the perception of the public that any of us would try.

Ask yourself if your grandmother would understand that you are doing a futile or intellectual exercise? No... All she knows is that her son or daughter is trying to cheat.

I implore you to stop this madness now... Let this thread die...
I agree, will a mod please close this?
  #4   Spotlight this post!  
Unread 06-01-2005, 20:48
Jay H 237 Jay H 237 is offline
Down at the railroad
AKA: Jason Hartmann
FRC #0237 (Black Magic)
Team Role: Mentor
 
Join Date: Dec 2003
Rookie Year: 1999
Location: Watertown,CT
Posts: 3,331
Jay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond reputeJay H 237 has a reputation beyond repute
Send a message via AIM to Jay H 237
Re: Concerning pdf security

As a reminder to everyone,

attempting to decrypt the password isn't GP, and will make you and your team look bad.
Also if you are (or know someone who is) attempting to decrypt it, by all means DON'T mention anything on this site. I'm quite sure ChiefDelphi and Team 47 don't want the liability if someone posts the password or part of it!
__________________
2006 Maryland Delphi "Driving Tomorrow's Technology" award
2006 Connecticut General Motor's Industrial Design award
2005 Finalists-----------New Jersey (along with our alliances again, 56 & 303)
2005 WINNERS of the Radio Shack Innovation in Control Award (not once, but twice! )
2004 WINNERS ------ Johnson & Johnson Mid-Atlantic Regional (also thanks to our alliances 56 & 303)
2004 General Motors Industrial Design Award Winners
2004 Archimedes Quarterfinalists (also thanks to our alliances 121 & 386)

NEMO _________ NonEngineering Mentor Organization
"Make it idiot proof and someone will make a better idiot!" - author unknown
  #5   Spotlight this post!  
Unread 06-01-2005, 20:48
Petey's Avatar
Petey Petey is offline
Strategy & Gaming
AKA: Chris Peterson
None #1073 (Team F.O.R.C.E.)
Team Role: Alumni
 
Join Date: Jan 2003
Rookie Year: 2002
Location: Hollis-Brookline, NH
Posts: 644
Petey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond reputePetey has a reputation beyond repute
Re: Concerning pdf security

Quote:
Originally Posted by Mike Betts
The issue is not if you could try or not (It's near impossible even if you know there were 14 characters in the key). It's the perception of the public that any of us would try.

Ask yourself if your grandmother would understand that you are doing a futile or intellectual exercise? No... All she knows is that her son or daughter is trying to cheat.

I implore you to stop this madness now... Let this thread die...
Some might argue that if you have the technological skill to write or apply an algorithm of such force that you *can* crack the PDF key, it would be a just reward.

--Petey
__________________

Bio:
Team 1073 alumnus, now Admissions Officer at MIT.

Thanks to all those who have helped me through FIRST over the years.
Closed Thread


Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
PDF Key Gadget470 Rules/Strategy 11 10-01-2004 20:36
PHP as a security risk purplehaze357 Website Design/Showcase 9 02-07-2003 21:50
2002 security? Summmergrl2298 Rumor Mill 4 13-01-2002 20:24
PDF Files nick reynolds General Forum 2 05-01-2002 20:31
NASA security problem. Anthony S. General Forum 8 03-01-2002 11:33


All times are GMT -5. The time now is 02:48.

The Chief Delphi Forums are sponsored by Innovation First International, Inc.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Copyright © Chief Delphi