ElcomSoft

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

Lua error in package.lua at line 80: module 'strict' not found. Lua error in package.lua at line 80: module 'strict' not found.

ElcomSoft Co.Ltd.
Private
Industry Software
Genre Password Cracking, Operating System Audit www.ElcomSoft.com
Founded 1990
Headquarters Moscow, Russia

ElcomSoft Co.Ltd. is a privately owned software company headquartered in Moscow, Russia. Since its establishment in 1990, the company has been working on computer security programs, with the main focus on password and system recovery software.

The DMCA case

<templatestyles src="Module:Hatnote/styles.css"></templatestyles>

On July 16, 2001, Dmitry Sklyarov, a Russian citizen employed by ElcomSoft who was at the time visiting the United States for DEF CON, was arrested and jailed for allegedly violating the United States DMCA law by writing ElcomSoft's Advanced eBook Processor software. A landmark court case ensued, setting precedents and attracting much public attention and protest. On December 17, 2002, ElcomSoft was found not guilty of all four charges under the DMCA. Bruce Chizen, CEO of Adobe Systems, had this to say to CNET:

Looking back with 20/20, I wish that we could have had better communication with ElcomSoft, Dmitry Sklyarov and the EFF (Electronic Frontier Foundation) before the whole thing went public. I'm sorry that we weren't able to do that, because I think we could have resolved a lot of the issues.[1]

Thunder Tables

Thunder Tables(R) is the company's own technology developed to ensure guaranteed recovery of Microsoft Word and Microsoft Excel documents protected with 40-bit encryption. The technology first appeared in 2007 and employs the time-memory tradeoff method to build pre-computed hash tables, which open the corresponding files in a matter of seconds instead of days. These tables take around ~ 4GB. So far, the technology is used in 2 password recovery programs: Advanced Office Password Breaker and Advanced PDF Password Recovery.

US Patents

7,599,492 - Fast cryptographic key recovery system and method [2] [3]
7,783,046 - Probabilistic cryptographic key identification with deterministic result [4] [5]
7,787,629 - Use of graphics processors as parallel math co-processors for password recovery [6] [7]
7,809,130 - Password recovery system and method [8] [9]
7,929,707 - Use of graphics processors as parallel math co-processors for password recovery [10] [11]

Cracking Wi-Fi Password with GPUs

In 2009 ElcomSoft released a tool that takes WPA/WPA2 Hash Codes and uses brute force methods to guess the password associated with a wireless network. [12] The brute force attack is carried out by testing passwords with a known SSID of a network of which the WPA/WPA2 Hash Code has been captured. The passwords that are tested are generated from a dictionary using various mutation (genetic algorithm) methods, including case mutation (password, PASSWORD, PassWOrD, etc.), year mutation (password, password1992, password67, etc.), and many other mutations to try to guess the correct password.

The advantages of using such methods over the traditional ones, such as rainbow tables,[13] are numerous. Rainbow tables, being very large in size because of the amount of SSID/Password combinations saved, take a long time to traverse, cannot have large numbers of passwords per SSID, and are reliant on the SSID being a common one which the rainbow table has already listed hash codes for (Common ones include linksys, belkin54g, etc.). EWSA, however, uses a relatively small dictionary file (a few megabytes versus dozens of gigabytes for common rainbow tables) and creates the passwords on the fly as needed. Rainbow tables are tested against a captured WPA/WPA2 Hash Code via a computer's processor with relatively low numbers of simultaneous processes possible. EWSA, however, can use a computer's processor(s), with up to 32 logical cores, up to 8 GPUs, all with many CUDA cores(NVIDIA) or Stream Processors(ATI).

Vulnerability in Canon authentication software

On November 30, 2010, Elcomsoft announced that the encryption system used by Canon cameras to ensure that pictures and Exif metadata have not been altered was flawed and cannot be fixed.[14] On that same day, Dmitry Sklyarov gave a presentation at the Confidence 2.0 conference in Prague demonstrating the flaws.[15] Among others, he showed an image of an astronaut planting a flag of the Soviet Union on the moon; all the images pass Canon's authenticity verification.[16] [17]

References

  1. http://www.planetpdf.com/mainpage.asp?webpageid=3123
  2. http://www.google.com/patents/US7599492
  3. http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN/7599492
  4. http://www.google.com/patents/US7783046
  5. http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN/7783046
  6. http://www.google.com/patents/US7787629
  7. http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN/7787629
  8. http://www.google.com/patents/US7809130
  9. http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN/7809130
  10. http://www.google.com.ar/patents/US7929707
  11. http://patft.uspto.gov/netacgi/nph-Parser?Sect2=PTO1&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&d=PALL&RefSrch=yes&Query=PN/7929707
  12. http://hothardware.com/cs/forums/t/41491.aspx
  13. http://wirelessdefence.org/Contents/coWPAttyMain.htm
  14. http://www.pcworld.com/businesscenter/article/211965/analyst_finds_flaws_in_canon_image_verification_system.html
  15. http://201002.confidence.org.pl/prelegenci/dmitry-sklyarov
  16. http://www.pcworld.idg.com.au/article/369757/analyst_finds_flaws_canon_image_verification_system/
  17. http://boingboing.net/2010/11/30/dmitry-sklyarov-and.html

External links