What are the main cracking methods?
These methods are based on vulnerabilities existing in cryptoalgorithms and their implementation. In case of absolutely weak algorithm or terrible flaws in implementation it may be “one byte patching” method – then simply changing one byte in the program will result in correct decrypting without right password. It is surprising fact that such programs still exist. Weak algorithms or incorrect usage of strong ones allow using other simple methods of password recovery. They vary in specific applications but the main idea is substantial reducing of possible passwords on the basis of additional information. In case of secure algorithms (when attacker can only generate passwords and check them) two main methods exist – brute force attack and dictionary attack. Brute force attack is used when there is no additional information on password and attacker simply tries all possible passwords – one-characters, two-characters etc. To resist this attack the cryptosystem should encourage long mixed-c