Thread: One wall falls, another rises in it's place

  1. #16
    Devil's Advocate SlyMaelstrom's Avatar
    Join Date
    May 2004
    Location
    Out of scope
    Posts
    4,079
    Quote Originally Posted by Mario F. View Post
    What I find irritating is that personal private information is still out there in raw format. I don't know... but everytime I'm doing a customer table(s), I have always hashed last name, address, postal code and phone and email contacts (along with any single CC field). The fact the media always loves a good ruckus around credit card theft, shouldn't stop anyone involved in actually creating these database from using bloody common sense and actually learn how to preoperly identify sensitive information. It's not just the goddamn credit cards, for pete's sake.
    Forgive my inexperience with cryptography, but I don't understand how you can hash data that must have its original form supplied in some way in the future... like for instance, names, addresses, and of course credit card numbers...

    Once it's hashed, you can't really get it back... even if you know all the details of how it was hashed you still have the pidgeon-hole principle to contend with... it's not like Sony can bill a credit card company with 5af4378e537ed82689b42478e217d547 or tell them "the credit card number is either 4544-1246-6044-6743 or 0543-1325-2352-1402 or 6785-4063-2563-2302, I'm not sure"... I suppose you can do some sort of reversible encryption, but not a hash... not as far as I understand them.
    Sent from my iPadŽ

  2. #17
    Woof, woof! zacs7's Avatar
    Join Date
    Mar 2007
    Location
    Australia
    Posts
    3,459
    Quote Originally Posted by nvoigt View Post
    ...
    I really wish we could vote for single politicians instead of whole parties...
    Didn't Germany run into that snag 60 odd years ago? ;-)

    It sounds like Sony forgot about the 10 immutable laws of security... And/or it's probably no co-incidence that these attacks occurred after Sony re-trenched a whole bunch of people, who cares how much security you have if the "hacker" has the keys!
    Last edited by zacs7; 05-05-2011 at 03:15 PM.

  3. #18
    (?<!re)tired Mario F.'s Avatar
    Join Date
    May 2006
    Location
    Ireland
    Posts
    8,446
    Quote Originally Posted by SlyMaelstrom View Post
    Forgive my inexperience with cryptography, but I don't understand how you can hash data that must have its original form supplied in some way in the future... like for instance, names, addresses, and of course credit card numbers...
    Keep in mind we are talking about cryptographic hash functions (like SHA-2), not high-collision hash functions created for purposes other then cryptography. Also, concerning databases, arguably I tend to use it as an umbrella term that includes database encryption services like those present in SQL Server.
    Originally Posted by brewbuck:
    Reimplementing a large system in another language to get a 25% performance boost is nonsense. It would be cheaper to just get a computer which is 25% faster.

  4. #19
    Registered User
    Join Date
    Nov 2010
    Location
    Long Beach, CA
    Posts
    5,909
    Cryptographic hashes by design are one-way functions. There is no feasible way to go from the digest back to the message. If you've found a way to easily reverse these functions, you just turned the math world upside down. Some guys in a black helicopter will come in the middle of the night and raid your house, taking you away to some secret government facility to put you to nefarious use. Using hashes for data like last names only makes sense if you never want to recall the last name, only verify if the user entered the same last name as they did when they were entered in the database. The database encryption services you are referring to use some sort of two-way encryption algorithm (like DES & AES). Whether it's symmetric or not, and whether it's block or stream, etc depends. But two-way ciphers are the only way to feasibly encrypt data and retrieve the plain text from the cipher text.

  5. #20
    Registered User
    Join Date
    Jan 2009
    Posts
    1,485
    Quote Originally Posted by anduril462 View Post
    Cryptographic hashes by design are one-way functions. There is no feasible way to go from the digest back to the message.
    For anything vulnerable to dictionary attacks such as passwords it is feasible by hashing your "words.txt" file that you use for the dictionary attack, hence the salt that was mentioned earlier. I don't see how a credit card number can be exposed by a dictionary attack though.

  6. #21
    (?<!re)tired Mario F.'s Avatar
    Join Date
    May 2006
    Location
    Ireland
    Posts
    8,446
    Yup. Dunno why I came up with SHA-2. Probably was too hungup on the term "hash" which I tend to use too loosely when discussing database encryption (and hashing) of data. To be clear, hashing CCs and personal data (with the exception of passwords) is not what I mean to say, unless the system includes the requirement for the user to input some of this information at every transaction. The current system requires the user to always input the CC expiration date, for instance. So that's hashed. The remaining sensitive data is encrypted.
    Originally Posted by brewbuck:
    Reimplementing a large system in another language to get a 25% performance boost is nonsense. It would be cheaper to just get a computer which is 25% faster.

  7. #22
    Registered User
    Join Date
    Nov 2010
    Location
    Long Beach, CA
    Posts
    5,909
    Quote Originally Posted by Subsonics View Post
    For anything vulnerable to dictionary attacks such as passwords it is feasible by hashing your "words.txt" file that you use for the dictionary attack, hence the salt that was mentioned earlier. I don't see how a credit card number can be exposed by a dictionary attack though.
    Maybe I wasn't clear.

    The dictionary attack comment I made in post #14 was simply stating that, out of the (assumed) 77 million accounts, odds are some of them had easy dictionary passwords, thus, somebody could relatively easily find a user name and password combo. I doubt that gives direct access to any CC info, but who knows. I have no idea what all data they got and how any of it was salted or encrypted, etc. Suffice to say that having valid logins and passwords certainly compromises a system that stores credit card info on it. I don't know how probable it is, but it's certainly possible.

    The hashing comment I made in post 19, that you quoted, was in response to Mario F's loose usage of "hash" in post 15. A loose usage he confirmed in post 21.

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. FscanF Program falls over
    By gda2004 in forum C Programming
    Replies: 9
    Last Post: 12-02-2009, 12:34 PM
  2. The wall behind is showing over the wall in front. (Glut)
    By Queatrix in forum C++ Programming
    Replies: 2
    Last Post: 10-22-2005, 04:50 PM
  3. Jet Li falls on hard times?
    By Govtcheez in forum A Brief History of Cprogramming.com
    Replies: 11
    Last Post: 01-29-2005, 10:11 AM
  4. temperature rises
    By MisterSako in forum Tech Board
    Replies: 22
    Last Post: 09-28-2004, 01:08 PM
  5. when does niagara falls open ?
    By blitzkrieg in forum A Brief History of Cprogramming.com
    Replies: 18
    Last Post: 04-18-2003, 10:37 PM