Serangan Terhadap Skema Enkripsi Winzip Menggunakan Known

Total Page:16

File Type:pdf, Size:1020Kb

Serangan Terhadap Skema Enkripsi Winzip Menggunakan Known Skema Enkripsi Pada WinZip dan Serangannya Andresta RamadhanSetiawan (13503030) Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika, Institut Teknologi Bandung Jl. Ganesha 10 Bandung Email : [email protected] Abstrak Winzip merupakan aplikasi kompresi yang sangat popular pada system operasi Windows. Selain melakukan kompresi, untuk menjaga kerahasiaan arsip, Winzip menyediakan fitur enkripsi. Versi terbaru yang ada di situs resminya yaitu Winzip 10 menggunakan enkripsi AES untuk melindungi arsip rahasia pengguna. Untuk mendukung enkripsi pada versi Winzip yang lama (sebelum versi 9), pada versi terbaru ini juga masih disertakan enkripsi tradisional ZIP 2.0. Pada makalah ini akan dijelaskan bagaimana mengenai format berkas zip, bagaimana skema enkripsi yang digunakan oelh WinZip untuk melindungi berkas-berkas rahasia. Skema Enkripsi WinZip rentan terhadap serangan seperti known- plaintext attack, random seed attack. Serangan menggunakan bruteforce atau dictionary attack juga cukup berbahaya jika password yang digunakan pendek, dalam waktu yang singkat password dapat diperoleh. Hal ini yang biasanya digunakan program password recovery untuk mendapatkan password. Kata Kunci : WinZIP, Known Plaintext Attack, plaintext, chipertext. 1. Pendahuluan menjadi berkas zip telah terkompresi sehingga lebih kecil ukurannya dari berkas aslinya. ZIP format adalah salat satu dari sekian banyak format yang paling banyak digunakan oleh Penghematan ruang penyimpanan. Seperti telah program kompresi dan pengarsipan data pada disebutkan, berkas yang diarsipkan menjadi berbagai macam sistem operasi. Satu atau lebih berkas zip akan dikompresi sehingga ukurannya berkas (file) yang telah dikompres dapat dimuat lebih kecil. Hal ini bermanfaat untuk menghemat pada satu berkas zip (zip file). Zip file menjaga ruang penyimpanan pada diska. Jika anda berkas-berkas yang saling berhubungan tetap memiliki berkas yang berukuran besar dan jarang menyatu sehingga akan mudah untuk digunakan arsipkan saja menjadi berkas zip dan disebarluaskan baik itu lewat email, mengunduh unzip hanya jika berkas tersebut akan digunakan. berkas dari internet selain itu kemampuannya untuk mengkompresi data membuat penyimpanan Menjaga berkas sekelompok berkas tetap utuh. berkas zip lebih efisien. Berikut ini adalah Ketika mengirimkan berkas-berkas dalam satu beberapa keuntungan menyimpan berkas dalam berkas zip tentunya akan lebih menguntungkan, format zip karena kemungkinan berkas 'tercecer' atau hilang sangat kecil. Memudahkan pendistribusian data lewat internet. Pendistribuasian data lewat internet akan lebih 2. Berkas .ZIP mudah dan cepat, terutama data yang terdiri lebih dari satu arsip. Hanya dengan unduh untuk Sejarah mengambil satu atau lebih berkas yang Berkas format ZIP diciptakan oleh Phil Katz, dibutuhkan selain itu prosesnya pun akan lebih pendiri PKWARE, setelah perselisihan mengenai cepat karena semua berkas yang diarsipkan hak paten merek dagang ARC (kependekan dari archieve) dan ekstensi nama berkas .arc antara 1 PKWare dengan System Enhancement Associates ZIP semakin dikenal dan digemari sehingga dapat (SCA). dikatakan ZIP telah menjadi standar untuk kompresi dan pengarsipan berkas. Hampir semua Produk pengarsipan PKWare yang pertama program pengarsipan dan kompresi berkas saat adalah PKARC menggunakan kode sumber yang ini mendukung format ZIP. Salah satu program dipublikasikan oleh SCA. Kode sumber SCA dari sekian banyak yang ada dan banyak yang ditulis dalam bahasa C diubah digunakan, dan yang akan dibahas dalam menggunakan bahasa asembly (mesin) sehingga makalah ini, adalah WinZip. lebih cepat prosesnya. PKArc juga menggunakan ekstensi nama berkas yang sama dengan yang Informasi Teknis digunakan SCA yaitu ".arc". Oleh karean itu, Spesifakasi format ZIP mengindikasikan bahwa SCA menuntut royalti atas penggunaan merek berkas-berkas dapat disimpan tanpa kompresi dagang dan kode sumbernya. Akan tetapi atau dengan menggunakan variasi alogoritma PKWare menolak. SCA memenangkan tuntutan kompresi lainnya. Pada kenyetaannya, format ZIP di pengadilan atas pelanggaran merek dagang yang digunakan menggunakan algoritma oleh PKWare. Akhirnya Katz merilis ulang DEFLATEnya Katz, kecuali ketika berkas yang produknya dengan mengganti nama menjadi ditambahkan pada arsip telah dikompresi terlebih PKPAK. dahulu atau berkas tersebut akan rusak jika dikompresi. Walaupun sudah mengganti nama menjadi PKPAK, Katz tetap harus membayar lisensi atas Untuk masalah keamanan berkas yang peggunaan kode sumber SEA. Karena Katz tetap diarsipkan, ZIP mendukung penggunaan kata menolak untuk membayar royalti akhirnya ia sandi untuk mengenkripsi menggunakan enkripsi membuat format berkas pengarsipan sendiri, yang kunci simetri. Beberapa fitur baru ditambahkan sampai sekarang terkenal diseluruh dunia sebagai seperti metode enkripsi dan kompresi yang lebih format ZIP. Format ZIP yang didesain Katz lebih mutahir. Tapi fitur ini tidak didukung oleh semua kokoh dan tahan terhadap korupsi data dari pada program pengarsipan dan kompresi yang ada format ARC karena katolag data yang dipasaran. Salah satu program yang mendukung "redundan". Selain itu, ZIP juga lebih fleksibel enkripsi adalah WinZip, yang akan dibahasah karena memungkinkan adanya tambahan pada makalah ini. algoritma untuk kompresi data dan juga tempat unuk pengembangan lebih jauh. Ketika perangkat lunak PKZIP dirilis, banyak orang yang mulai 3. WinZip meninggalkan format ARC karena dinilai lebih lambat dan tidak efektif performanya dalam WinZip adalah sebuah program pengarsipan dan melakukan kompresi data. kompresi berkas yang cukup banyak digunakan dan berjalan pada sistem operasi Windows. Katz mempublikasikan dokumen teknis format Dikembangkan oleh WinZip Computing, dulunya berkas ZIP bersamaan dengan dikeluarkannya Nico Mak Computing, WinZip menggunakan versi pertama perangkat lunak pengarsipan format PKZIPnya PKWARE dengan dukungan PKZIP pada bulan Januari 1989. Penggunaan tambahan terhadap format kompresi lainnya. nama ZIP (yang berarti cepat) diusulkan oleh Robert Mahoney. Mereka menginginkan WinZip mulai memasarkan produknya pada produknya lebih cepat dari pada ARC dan format tahun 1990an sebagai antarmuka grafis untuk kompresi yang lainnya. PKZIP. Pada sekitar tahun 1996, pencipta WinZip menggabungkan kode kompresi yang Ketika antarmuka berbasis grafis (graphical user berasal dari proyek Info-ZIP, kemudian interface) mulai banyak digunakan pada sistem menghilangkan kebutuhan akan eksekusi PKZIP operasi, mulai banyak program kompresi dan untuk disertakan pada produk WinZip. Pada pengarsipan bebasi grafis. Kebanyakan program- tanggal 2 Mei 2006, Corel Corporation program tersebut menggunakan format ZIP. Pada mengakuisisi WinZip Computing. akhir tahun 1990 telah banyak aplikasi pengaturan berkas (file manager) yang Yang membuat WinZip banyak digunakan orang mengintegrasikan format ZIP bahkan Microsoft adalah karena fitur-fitur yang ditawarkannya, bahkan mengintegrasikan format ZIP pada sistem antara lain: operasi Windowsnya. Hal ini membuat format 2 - mengkompresi dan melakukan berdasarkan standar keamanan saat ini sehingga "unzipping" format arsip PKZIP. penggunaannya hanya untuk keperluan keamanan - integrasi terhadap shell Windows yang rendah, tidak direkomendasikan untuk - mengenkripsi berkas rahasia menggunakan melakukan enkripsi pada berkas yang sangat enkripsi kunci simetri rahasia. Alasan enkripsi ZIP 2.0 ini masih - menulis arsip ZIP langsung ke CD maupun disertakan adalah untuk mendukung DVD kompatibilitas terhadap aplikasi ZIP yang dahulu - versi 9.0 mengimplementasikan format yang mungkin masih digunakan sampai saat ini. PKZIP versi 64-bit yang mendukung lebih dari 65.535 berkas dalam satu arsip zip Proses enkripsi dilakukan pada aliran data yang dan ukuran arsip ZIP yang lebih dari 4 telah terkompresi. Berkas yang terenkripsi harus Gigabyte didekripsi terlebih dahulu sebelum diekstraksi - versi 10.0 mendukung bzip2 dan algoritma menjadi berkas-berkas asli. kompresi PPMd yang menghasilkan berkas arsip yang lebih kecil. Setiap berkas yang dienkripsi memiliki 12 byte - dapat bekerja dengan arsip ARC, ARJ, dan tambahan yang disimpan pada awal area data LHA. yang isinya mendefinisikan "header" enkripsi - mendukung format kompresi TAR, Z, GZ, untuk berkas tersebut. Header enkripsi tersenbut TAZ, dan TGZ yang biasa digunakan pada diisi dengan bilangan acak (random) dan lingkungan UNIX. kemudian dienkripsi menggunakan 3 buah kunci masing-masing 32-bit. Ketiga kunci tersebut Dari fitur-fitur diatas, yang menjadi sorotan diinisialisasi oleh kata kunci yang diisikan. adalah masalah keamanan yang ditawarkan oleh Setelah tiap byte data dienkripsi, kunci-kunci WinZip. Enkripsi yang disediakan WinZip harus tersebut kemudian diperbarui menggunakan dapat menjamin pengguna yang memiliki kunci teknik pembangkitan bilangan pseudo-random saja yang dapat mengakses berkas ZIP yang telah yang dikombinasikan dengan algoritma CRC-32 dienkripsi. Berikut ini adalah langkah-langkah secara umum Winzip untuk versi 9.0 keatas mendukung 128 yang dilakukan untuk mendekripsi berkas ZIP : dan 256 bit kunci enkripsi AES yang tentunya 1. Inisialisasi tiga buah kunci 32-bit dengan menyediakan tingkat keamanan yang lebih kata kunci. dibandingkan metode enkripsi Zip 2.0 yang 2. Baca dan dekripsi 12 byte header enkripsi, digunakan pada WinZip sebelum versi 9.0. AES kemudian inisialisasi kunci enkripsi enkripsi pada WinZip yang telah disertifikasi 3. Baca dan dekripsi aliran data yang FIPS-197 menggunakan algoritma kriptografi terkompres
Recommended publications
  • End-To-End Enterprise Encryption: a Look at Securezip® Technology
    End-to-End Enterprise Encryption: A Look at SecureZIP® Technology TECHNICAL WHITE PAPER WP 700.xxxx End-to-End Enterprise Encryption: A Look at SecureZIP Technology Table of Contents SecureZIP Executive Summary 3 SecureZIP: The Next Generation of ZIP 4 PKZIP: The Foundation for SecureZIP 4 Implementation of ZIP Encryption 5 Hybrid Cryptosystem 6 Crytopgraphic Calculation Sources 7 Digital Signing 7 In Step with the Data Protection Market’s Needs 7 Conclusion 8 WP-SZ-032609 | 2 End-to-End Enterprise Encryption: A Look at SecureZIP Technology End-to-End Enterprise Encryption: A Look at SecureZIP Technology Every day sensitive data is exchanged within your organization, both internally and with external partners. Personal health & insurance data of your employees is shared between your HR department and outside insurance carriers. Customer PII (Personally Identifiable Information) is transferred from your corporate headquarters to various offices around the world. Payment transaction data flows between your store locations and your payments processor. All of these instances involve sensitive data and regulated information that must be exchanged between systems, locations, and partners; a breach of any of them could lead to irreparable damage to your reputation and revenue. Organizations today must adopt a means for mitigating the internal and external risks of data breach and compromise. The required solution must support the exchange of data across operating systems to account for both the diversity of your own infrastructure and the unknown infrastructures of your customers, partners, and vendors. Moreover, that solution must integrate naturally into your existing workflows to keep operational cost and impact to minimum while still protecting data end-to-end.
    [Show full text]
  • The Basic Principles of Data Compression
    The Basic Principles of Data Compression Author: Conrad Chung, 2BrightSparks Introduction Internet users who download or upload files from/to the web, or use email to send or receive attachments will most likely have encountered files in compressed format. In this topic we will cover how compression works, the advantages and disadvantages of compression, as well as types of compression. What is Compression? Compression is the process of encoding data more efficiently to achieve a reduction in file size. One type of compression available is referred to as lossless compression. This means the compressed file will be restored exactly to its original state with no loss of data during the decompression process. This is essential to data compression as the file would be corrupted and unusable should data be lost. Another compression category which will not be covered in this article is “lossy” compression often used in multimedia files for music and images and where data is discarded. Lossless compression algorithms use statistic modeling techniques to reduce repetitive information in a file. Some of the methods may include removal of spacing characters, representing a string of repeated characters with a single character or replacing recurring characters with smaller bit sequences. Advantages/Disadvantages of Compression Compression of files offer many advantages. When compressed, the quantity of bits used to store the information is reduced. Files that are smaller in size will result in shorter transmission times when they are transferred on the Internet. Compressed files also take up less storage space. File compression can zip up several small files into a single file for more convenient email transmission.
    [Show full text]
  • Steganography and Vulnerabilities in Popular Archives Formats.| Nyxengine Nyx.Reversinglabs.Com
    Hiding in the Familiar: Steganography and Vulnerabilities in Popular Archives Formats.| NyxEngine nyx.reversinglabs.com Contents Introduction to NyxEngine ............................................................................................................................ 3 Introduction to ZIP file format ...................................................................................................................... 4 Introduction to steganography in ZIP archives ............................................................................................. 5 Steganography and file malformation security impacts ............................................................................... 8 References and tools .................................................................................................................................... 9 2 Introduction to NyxEngine Steganography1 is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. When it comes to digital steganography no stone should be left unturned in the search for viable hidden data. Although digital steganography is commonly used to hide data inside multimedia files, a similar approach can be used to hide data in archives as well. Steganography imposes the following data hiding rule: Data must be hidden in such a fashion that the user has no clue about the hidden message or file's existence. This can be achieved by
    [Show full text]
  • Archiving.Pdf
    Archiving Zip. Compression. Stuff like that. Written by Dan Gookin Published by Quantum Particle Bottling Co., Coeur d’Alene, ID, 83814 USA Copyright ©2008 by Quantum Particle Bottling Co., Inc. All Rights Reserved. This work cannot be reproduced or distributed without written permission of the copyright holder. Various copyrights and trademarks may or may not appear in this text. It is assumed that the trademark or copyright is owned by whoever owns it, and the use of that material here is in no way considered an infringement or abuse of the copyright or trademark. Further, there is. Oh, wait. Never mind. I’m just making all this up anyway. I’m not a lawyer. I hate lawyers. For additional information on this or other publications from Quantum Particle Bottling Co., please visit http://www. wambooli.com/ Second Edition December, 2008 Table of Contents Archiving .........................................................................................................2 What the Heck is Archiving? ............................................................................4 Historical Nonsense About Compressed Folders and ZIP Files ..........................5 The Bad Old Modem Days .............................................................................6 Packing Multiple Files Into a Single Library ..................................................6 Better than Library Files, Compressed Archives ............................................7 Enter the ARC file format ..............................................................................8
    [Show full text]
  • ES 201 684 V1.1.1 (1999-05) ETSI Standard
    Draft ES 201 684 V1.1.1 (1999-05) ETSI Standard Integrated Services Digital Network (ISDN); File Transfer Profile; B-channel aggregation and synchronous compression 2 ETSI Draft ES 201 684 V1.1.1 (1999-05) Reference DES/DTA-005069 (flc00icp.PDF) Keywords B-channel, FT, ISDN, Terminal ETSI Postal address F-06921 Sophia Antipolis Cedex - FRANCE Office address 650 Route des Lucioles - Sophia Antipolis Valbonne - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Internet [email protected] Individual copies of this ETSI deliverable can be downloaded from http://www.etsi.org If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 1999. All rights reserved. ETSI 3 ETSI Draft ES 201 684 V1.1.1 (1999-05) Contents Intellectual Property Rights ............................................................................................................................... 4 Foreword............................................................................................................................................................ 4 1 Scope.......................................................................................................................................................
    [Show full text]
  • Decompress Files with PCDEZIP
    With PCDEZIP you can confidently download files compressed with PKZIP, Version 2.0. BY BOB FLANDERS AND MICHAEL HOLMES Decompress files with PCDEZIP f you've been using PCUNZIP to PCDEZIP's syntax decompress files, it's time to upgrade to usage: PCDEZIP [switches] zipfile [target\1 [filespec 1...11 I the new PCDEZIP. Phil Katz has released Version 2.0 of his popular switches: -f freshen existing files shareware compression program, PKZIP, extract new and updated files do not prompt on overwrite and the old utility can't decompress the ZIP directory newly zipped files. The new PCDEZIP will -d create directories unzip files zipped with either version of -t test file integrity PKZIP. zipfile .ZIP file Although we have added some valuable new features to PCDEZIP, our attempt has target \ the target directory; trailing backslash required not been to duplicate all the capabilities of the commercial product. PCDEZIP does filenames are files to be extracted; wildcards supported not, for example, permit using wildcard Fig 1: When you enter PCDEZIP with no parameters, it displays its syntax and switches as shown here characters in the .ZIP filename, handle files that span more than one floppy disk, preserve read-only file attributes, or respectively. If you don't supply a compiler it. For example, if SOURCE.ZIP is in your decrypt encrypted files. To get these parameter, C.BAT assumes Borland C++ D :\ PROJECT directory, then the com- facilities — and, of course, to be able to zip 3.1. mand files yourself — you must obtain the full- scale PKZIP, which is available from My PCDEZIP D:\PROJECT\SOURCE Computer Company on (02) 565 1991.
    [Show full text]
  • PKZIP Stream Cipher 1 PKZIP
    PKZIP PKZIP Stream Cipher 1 PKZIP Phil Katz’s ZIP program Katz invented zip file format o ca 1989 Before that, Katz created PKARC utility o ARC compression was patented by SEA, Inc. o SEA successfully sued Katz Katz then invented zip o ZIP was much better than SEA’s ARC o He started his own company, PKWare Katz died of alcohol abuse at age 37 in 2000 PKZIP Stream Cipher 2 PKZIP PKZIP compresses files using zip Optionally, it encrypts compressed file o Uses a homemade stream cipher o PKZIP cipher due to Roger Schlafly o Schlafly has PhD in math (Berkeley, 1980) PKZIP cipher is susceptible to attack o Attack is nontrivial, has significant work factor, lots of memory required, etc. PKZIP Stream Cipher 3 PKZIP Cipher Generates 1 byte of keystream per step 96 bit internal state o State: 32-bit words, which we label X,Y,Z o Initial state derived from a password Of course, password guessing is possible o We do not consider password guessing here Cipher design seems somewhat ad hoc o No clear design principles o Uses shifts, arithmetic operations, CRC, etc. PKZIP Stream Cipher 4 PKZIP Encryption Given o Current state: X, Y, Z (32-bit words) o p = byte of plaintext to encrypt o Note: upper case for 32-bit words, lower case bytes Then the algorithm is… k = getKeystreamByte(Z) c = p ⊕ k update(X, Y, Z, p) Next, we define getKeystreamByte, update PKZIP Stream Cipher 5 PKZIP getKeystreamByte Let “∨” be binary OR Define 〈X〉i…j as bits i thru j (inclusive) of X o As usual, bits numbered left-to-right from 0 Shift X by n bits to right:
    [Show full text]
  • Virus Bulletin, June 1990
    June 1990 ISSN 0956-9979 THE AUTHORITATIVE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Edward Wilding Technical Editor: Fridrik Skulason, University of Iceland Editorial Advisors: Jim Bates, Bates Associates, UK, Phil Crewe, Fingerprint, UK, Dr. Jon David, USA, David Ferbrache, Heriot-Watt University, UK, Dr. Bertil Fortrie, Data Encryption Technologies, Holland, Hans Gliss, Datenschutz Berater, West Germany, Ross M. Greenberg, Software Concepts Design, USA, Dr. Harold Joseph Highland, Compulit Microcomputer Security Evaluation Laboratory, USA, Dr. Jan Hruska, Sophos, UK, Dr. Keith Jackson, Walsham Contracts, UK, Owen Keane, Barrister, UK, Yisrael Radai, Hebrew University, Israel, John Laws, RSRE, UK, David T. Lindsay, Digital Equipment Corporation, UK, Martin Samociuk, Network Security Management, UK, John Sherwood, Sherwood Associates, UK, Roger Usher, Coopers&Lybrand, UK, Dr. Ken Wong, BIS Applied Systems, UK KNOWN IBM PC VIRUSES CONTENTS (UPDATE) 11 EDITORIAL TOOLS & TECHNIQUES Computer Viruses as Weapon Dynamic Decompression, Systems 2 LZEXE and the Virus Problem 12 PROCEDURES WORM PROGRAMS Training and Awareness 3 The Internet Worm - Action and Reaction 13 FEATURE ARTICLE PRODUCT REVIEW The Bulgarian Computer Viruses - ‘The Virus Factory’ 6 Certus - Tools To Fight Viruses With 18 ANTI-VIRUS SOFTWARE END-NOTES & NEWS 20 FOR IBM PCs 10 VIRUS BULLETIN ©1990 Virus Bulletin Ltd, England./90/$0.00+2.50 This bulletin is available only to qualified subscribers. No part of this publication may be reproduced, stored in a retrieval system, or transmitted by any form or by any means, electronic, magnetic, optical or photocopying, without the prior written permission of the publishers or a licence permitting restricted copying issued by the Copyright Licencing Agency.
    [Show full text]
  • Lossless Compression: State of the Art Many More Variants
    Lossless compression: state of the art Many more variants In our lessons we’ve seen some of the most common algorithms for lossless compression Literature and applications present some other algorithms and many more variants Popular applications have proprietary encoding schemes 2 State of the art (2005) Windows . .zip . .Cab . .RAR . .ACE . .7z (7-Zip) Linux . .gz (gzip) . .bz2 (bzip2) . .Z (Compress) Mac . .zip . .sit (Stuffit) 3 zip format - I The ZIP file format was originally created by Phil Katz, founder of PKWARE Katz publicly released technical documentation on the ZIP file format, along with the first version of his PKZIP archiver, in January 1989. Katz had converted compression routines of a previously available archival program, ARC, from C to optimized assembler code He has been processed for for copyright infringement and condemned 4 zip format - II Then he created his own file format, and the .zip format he designed was a much more efficient compression format than .ARC In the mid 1990s, as more new computers included graphical user interfaces, some authors proposed shareware compression programs with a GUI The most famous, in Windows environment, is Winzip (www.winzip.com) zip format uses a a combination of the LZ77 algorithm and Huffman coding 5 zip format - III In the late 1990s, various file manager software started integrating support for the zip format into the file manager user interface Windows Explorer (Windows Me, Windows XP) Finder (Mac OS X) Nautilus file manager used with GNOME Konqueror file
    [Show full text]
  • Penrith Valley Seniors Centre Penrith Valley Seniors Centre
    P.O. Box 4063 Penrith N.S.W. 2751 Tel. 47210609 Fax 47215224 Penrith Valley Seniors Centre 86 Station Street Penrith N.S.W.2750 Email [email protected] Editor Tom Lehane October 2006 President: George Bell Tel: 4721 3681 Member: Pat Mitchell Tel: 9623 4358 Vice-President: Alan Lees P e n Treil:t h4 7V36a 5ll5e4y1 Seniors CentreM ember: Anne Roddick Tel: 4721 4343 Secretary: Zillah Warner Tel: 4732 4248 Member: John Windle Tel 4731 2149 Treasurer: Bert Foster Tel: 4754 3008 Webmaster: Tom Lehane Tel: 4721 5375 Social Committee: Pat Mitchell, Zillah Warner, Anne Roddick Visit the clubs web page for training courses ....... www.users.on.net/pvscc/training.htm Weekly Schedule for Computer Courses Mondays 9.30am to 11am Beginners & Do your own thing. Tuesdays 9.30am to 11am Beginners & Do your own thing 11.00 am to 12.30 pm Graphics. 11.00 am to 12.30 pm Graphics (Digital Editing). Tutor: Zillah Warner Tutor Bert Foster Wednesdays 9.30am to 11am Using the Software. Thursdays: 9.30am to 11am Beginners, Card Making and Tutor: Tom Lehane Do your own thing. 1pm to 2.30pm Beginners, Internet/Email, and Genealogy Tutors Pat Mitchell & Zillah Warner Tutor: George Bell and John Windle Fridays: 9.30am to 11am Beginners & Do your own thing. ‘Do your own thing’ means learn Word, Publisher, Excel or Tutor Alan Lees and John Windle play on the Internet. Please note: Wednesday afternoon classes on the 2nd Wednesday of each month are closed. Local News. Seniors Centre will be closing from 8th December 2006 and will reopen 15th January 2007.
    [Show full text]
  • Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving
    doi:10.2218/ijdc.v7i2.227 Digital Forensics Formats 21 The International Journal of Digital Curation Volume 7, Issue 2 | 2012 Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving Yunhyong Kim, Humanities Advanced Technology and Information Institute, University of Glasgow Seamus Ross, Faculty of Information, University of Toronto, Canada and Humanities Advanced Technology and Information Institute, University of Glasgow Abstract In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format). We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.
    [Show full text]
  • Study on a Known-Plaintext Attack on ZIP Encryption
    Study on a known-plaintext attack on ZIP encryption Dragos Barosan [email protected] February 8, 2015 Abstract The ZIP file format is one of the most popular compression format and it provides a stream cipher encryption for protecting data. A successful known plaintext attack has been developed since 1994, but there is no open source im- plementation for it. The research has focused on the feasibility of a successful, since the necessary plaintext is considered hard to obtain, and analyzed the al- gorithm. It has been found that, while difficult, plaintext can be found through varied resources. From an implementation point of view the algorithm contains sections that can be run in parallel, improving the execution speed. As future work, a full implementation of the algorithm is planned and it will be released as open source. Contents 1 Introduction 3 2 Research questions 4 3 Related work 5 4 Approach 7 5 Feasibility of obtaining plaintex 8 5.1 ZIP Defaults . 8 5.2 ZIP Encryption . 9 5.3 Difficulty of obtaining plaintext . 9 5.4 Solution . 11 6 Attack Implementation 13 6.1 Overview . 13 6.2 Locate Data . 14 6.3 First stage of the attack . 16 6.4 Implementation . 17 6.5 Measurements . 18 7 Conclusions and Future Work 20 8 Appendices 23 2 Chapter 1 Introduction The ZIP archive file format was originally created in 1989 by Phil Katz to sup- port lossless data compression and replace the ARC archiving system. The first version has been has been released in the PKZIP package from the PKWARE software company[1].
    [Show full text]