Bitcoin Forum
November 01, 2024, 12:05:16 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: Saving private key in MS Word  (Read 1568 times)
subwoofer12 (OP)
Sr. Member
****
Offline Offline

Activity: 251
Merit: 253



View Profile
May 06, 2014, 05:07:47 AM
 #1

I haven't actually done this, but how secure would this be? I know that Office 2003 and lower is very unsafe, only uses 40-bit encryption. But what about Office 2007-2010 which uses 128-bit encryption? Although according to Wikipedia:

Quote
The 128-bit key AES protection employed in Office 2007–2010 can still be considered as a relatively secure one. At the moment, however, cloud computing facilities are capable of unlocking a substantial number of the files saved in the Office 2007–2010 format.

I'm currently using Office 2013, does anyone know if Microsoft switched to 256-bit encryption in 2013?

http://en.wikipedia.org/wiki/Microsoft_Office_password_protection



edit

Also I'll mention:

Quote
Excel and Word 2010 still employ AES and a 128-bit key, but the number of SHA-1 conversions has doubled to 100,000 further reducing password recovery speed.
ar9
Sr. Member
****
Offline Offline

Activity: 352
Merit: 250



View Profile
May 06, 2014, 05:37:06 AM
 #2

This isn't the worst idea I've seen.  I'm curious about what security experts think about this.
Certainly seems convenient, doesn't it?
jbrnt
Hero Member
*****
Offline Offline

Activity: 672
Merit: 500



View Profile
May 06, 2014, 05:52:22 AM
 #3

I do not trust word not because of their encryption strength, but the integrity of the saved document. I have experienced word freezing while saving a document and corrupted the file. It was a large file with diagrams and photos, but still inexcusable. Save the keys in a plain text file and compress with 7zip or rar with 256bit aes encryption has the same effect.
erono
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
May 06, 2014, 05:59:43 AM
 #4

To prevent the document corrupted file, use a paper wallet. When you come to use your paper wallet, empty it all into your live wallet then put the stuff you want kept safe into a new paper wallet.

hashuniverse
Newbie
*
Offline Offline

Activity: 31
Merit: 0


View Profile
May 06, 2014, 06:01:00 AM
 #5

Why not save it in text file and use encryption like Axcrypt instead?
bryant.coleman
Legendary
*
Offline Offline

Activity: 3766
Merit: 1217


View Profile
May 06, 2014, 06:38:32 AM
 #6

A decent hacker can crack the password of any encrypted MS Word / MS Excel file in less than 5 minutes. This is one of the worst ideas I have ever heard here in Bitcointalk.  Grin
hilariousandco
Global Moderator
Legendary
*
Offline Offline

Activity: 3990
Merit: 2713


Join the world-leading crypto sportsbook NOW!


View Profile
May 06, 2014, 06:51:49 AM
 #7

It's not ideal, but it's not terrible either, providing you don't keep it on a computer and save it offline. Create it on a safe and offline computer and keep it on a USB and/or CD-R etc.

  ▄▄███████▄███████▄▄▄
 █████████████
▀▀▀▀▀▀████▄▄
███████████████
       ▀▀███▄
███████████████
          ▀███
 █████████████
             ███
███████████▀▀               ███
███                         ███
███                         ███
 ███                       ███
  ███▄                   ▄███
   ▀███▄▄             ▄▄███▀
     ▀▀████▄▄▄▄▄▄▄▄▄████▀▀
         ▀▀▀███████▀▀▀
░░░████▄▄▄▄
░▄▄░
▄▄███████▄▀█████▄▄
██▄████▌▐█▌█████▄██
████▀▄▄▄▌███░▄▄▄▀████
██████▄▄▄█▄▄▄██████
█░███████░▐█▌░███████░█
▀▀██▀░██░▐█▌░██░▀██▀▀
▄▄▄░█▀░█░██░▐█▌░██░█░▀█░▄▄▄
██▀░░░░▀██░▐█▌░██▀░░░░▀██
▀██
█████▄███▀▀██▀▀███▄███████▀
▀███████████████████████▀
▀▀▀▀███████████▀▀▀▀
█████████████LEADING CRYPTO SPORTSBOOK & CASINO█████████████
MULTI
CURRENCY
1500+
CASINO GAMES
CRYPTO EXCLUSIVE
CLUBHOUSE
FAST & SECURE
PAYMENTS
.
..PLAY NOW!..
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
May 06, 2014, 06:56:43 AM
 #8

A decent hacker can crack the password of any encrypted MS Word / MS Excel file in less than 5 minutes. This is one of the worst ideas I have ever heard here in Bitcointalk.  Grin

Nonsense.  If you want we can each put 1 BTC into escrow. i will give you a word file, you hack it, or have someone hack it within 5 days (more than your 5 minutes) and you win, otherwise I win once I provide passphrase to escrow so they can verify the file can be decrypted without issue given the correct passphrase.

Game?
Singlebyte
Hero Member
*****
Offline Offline

Activity: 854
Merit: 1000



View Profile
May 06, 2014, 07:17:46 AM
Last edit: May 06, 2014, 07:44:31 AM by Singlebyte
 #9

A decent hacker can crack the password of any encrypted MS Word / MS Excel file in less than 5 minutes. This is one of the worst ideas I have ever heard here in Bitcointalk.  Grin

Nonsense.  If you want we can each put 1 BTC into escrow. i will give you a word file, you hack it, or have someone hack it within 5 days (more than your 5 minutes) and you win, otherwise I win once I provide passphrase to escrow so they can verify the file can be decrypted without issue given the correct passphrase.

Game?

In the old days (10 years ago) it was easy to crack word/excel files.  I did it all the time for employee files using simple hacker tools.  More advanced tools were also easily purchased from sites like www.lostpassword.com.  (And we did occasionally purchase commercial cracking tools). But as the OP stated, word/excel has upped the encryption so I am sure it is more difficult.  I haven't really kept up on the tools or encryption hacks to know how feasible it is to crack current word/excel files.  But even back then it sometimes would take days to brute force a password.

kololo
Sr. Member
****
Offline Offline

Activity: 560
Merit: 250



View Profile
May 06, 2014, 10:17:49 AM
 #10

I don't think that is a good choice.
TrailingComet
Sr. Member
****
Offline Offline

Activity: 462
Merit: 250


View Profile
May 06, 2014, 10:38:28 AM
 #11

This is a hare-brained idea
Private keys are life - do you really wanna trust a MS product?!!

dogechode
Full Member
***
Offline Offline

Activity: 182
Merit: 100


View Profile
May 06, 2014, 05:17:45 PM
 #12

I am actually curious about how people really store their private keys. I have read several people saying stuff that indicates that they keep digital copies (not just written down or memorized.) But then other people are all like OMG OMG OMG no you can't do that it's not secure! You need to like, make a special file and then encrypt it and then double encrypt it and then copy it on a USB drive and seal it in a capsule and swallow it and poop it out and re-eat it every day just to be safe.

But realistically I doubt most people, except the very very select few super ultra obsessed geek nerd kings are going to such lengths.
jbrnt
Hero Member
*****
Offline Offline

Activity: 672
Merit: 500



View Profile
May 06, 2014, 06:02:01 PM
 #13

I am actually curious about how people really store their private keys....
But realistically I doubt most people, except the very very select few super ultra obsessed geek nerd kings are going to such lengths.

I think most people do not backup their private keys at all. They keep their coins at blockchain wallet and forget about it. Those who use bitcoin clients with wallet files would copy their encrypted wallet files on to usb flash drives or somewhere on their harddisk. Electrum users would surely write their seeds down on paper. Quite a few will have paper wallets.

Probably not that many users would save keys in plain text format.
guybrushthreepwood
Legendary
*
Offline Offline

Activity: 1232
Merit: 1195



View Profile
May 06, 2014, 06:14:26 PM
 #14

I am actually curious about how people really store their private keys. I have read several people saying stuff that indicates that they keep digital copies (not just written down or memorized.) But then other people are all like OMG OMG OMG no you can't do that it's not secure! You need to like, make a special file and then encrypt it and then double encrypt it and then copy it on a USB drive and seal it in a capsule and swallow it and poop it out and re-eat it every day just to be safe.

But realistically I doubt most people, except the very very select few super ultra obsessed geek nerd kings are going to such lengths.

It's good to be safe and secure but sometimes I think people go over the top. If you use a clean computer and back up your wallet or save your private key on a pass-word protected document and store it safely you'll probably be fine. I don't think you need to rar it then encrypt it then encrypt it again and store it in a safe within a safe lol. It just seems overkill.
umair127
Sr. Member
****
Offline Offline

Activity: 378
Merit: 250



View Profile
May 06, 2014, 06:17:08 PM
 #15

why dont u create a cold wallet with a external hard drive but make sure you use linux to do so, as your Pc can be already compromised with malware.  This is the best way I know I can think of keeping your btc secured. 

yatsey87
Hero Member
*****
Offline Offline

Activity: 840
Merit: 509


View Profile
May 06, 2014, 06:18:25 PM
 #16

I am actually curious about how people really store their private keys. I have read several people saying stuff that indicates that they keep digital copies (not just written down or memorized.) But then other people are all like OMG OMG OMG no you can't do that it's not secure! You need to like, make a special file and then encrypt it and then double encrypt it and then copy it on a USB drive and seal it in a capsule and swallow it and poop it out and re-eat it every day just to be safe.

But realistically I doubt most people, except the very very select few super ultra obsessed geek nerd kings are going to such lengths.

It's good to be safe and secure but sometimes I think people go over the top. If you use a clean computer and back up your wallet or save your private key on a pass-word protected document and store it safely you'll probably be fine. I don't think you need to rar it then encrypt it then encrypt it again and store it in a safe within a safe lol. It just seems overkill.

If you boot from a ubuntu live disk and do something like back up your wallet or copy your keys down you really will be fine.
lepirate
Hero Member
*****
Offline Offline

Activity: 541
Merit: 500


Garbochock


View Profile
May 06, 2014, 06:19:28 PM
 #17

I would encrypt it using other methods. Read this:
http://searchenterprisedesktop.techtarget.com/tip/Microsoft-Office-2013-crackable-so-look-to-Office-password-recovery
But Microsoft has maybe done something about that issue during the last 1 and a half years, I don't know, I don't use Office.
I'd stick with some trusted open-source encryption software anyway.
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
May 06, 2014, 06:26:01 PM
Last edit: May 06, 2014, 08:04:06 PM by DeathAndTaxes
 #18

I would encrypt it using other methods. Read this:
http://searchenterprisedesktop.techtarget.com/tip/Microsoft-Office-2013-crackable-so-look-to-Office-password-recovery
But Microsoft has maybe done something about that issue during the last 1 and a half years, I don't know, I don't use Office.
I'd stick with some trusted open-source encryption software anyway.

That article missed the point when it was written and time didn't make it any better.  Using the logic of the author, Bitcoin wallets are insecure because software exists to attempt to recover the wallet passphrase. Office 2013 uses AES 256 with 64 bit salt and the key derived using 100,000 spins of SHA-512PBKDGF2 using SHA-256.  That is nearly identical very similar in strength to the system used by Bitcoin Core client to encrypt private keys.  Can passwords be attacked by dictionary or premutation attack if the password is weak or short?  Sure and the exactly same password on the Bitcoin wallet (or truecrypt, or lastpass, or anywhere) would fail as well.   That is what password recovery software does.  It attempts to find the password by checking dictionaries, or using part of a known password, or trying permutations.  If the password is weak and you have enough computing power, you may find it, if it is strong you won't.

To the OP though I wouldn't use word unless for some reason you had no other options because simpler is usually better.  Why not just backup the wallet.dat or print a paper wallet (encryption optional)?
IvanG
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
May 06, 2014, 07:40:13 PM
 #19

This article is absolutely pointless. Yes, it's possible to remove "read only" marks from "protected" office document in no time but simply because without "open" password the contents of document is fully accessible and you don't even need any special program to edit XML file within ZIP file (which is in fact DOCX document's internal structure is) removing "read only" tag.

But if "password to open" is set the only way to break the protection is to get original password. And once it's complex enough (anybody around still using "password" as password? Really?) there no chances to crack it even with cloud of GPUs. I'm honestly have no idea how quote "At the moment, cloud computing facilities are capable of unlocking as many as ca. 80% of the files saved in the Office 2007–2010 format." got into wiki (linked by topic starter) but it's at least misleading.

Office 2007 using 50000xSHA1 iterations for key derivation and AES for encryption. Office 2010 using 100000xSHA1 (and making possible to use 128/192/256-bit AES keys). Office 2013 using 100000xSHA512 iterations (and still AES). What this means? Simple. You can brute-force about 40K passwords per second (http://golubev.com/gpuest.htm) with AMD 7970 for Office 2007 document and only about 1100 p/s with the same GPU for Office 2013 one (measured with http://passwordrecoverytools.com/office-password.asp). The difference is only 36x which means that adding one symbol (from smalls+digits charset) to password for Office 2007 making it "the same" in "crackable" terms as Office 2013 password. There no backdoors there -- brute-forcing the password (even with some smart mutations/dictionary based attacks) is the only option.

Or, in other words, weak password will be cracked no matter what version of Office you've used while even Office 2007 protection is enough if your password is really good. Office versions prior to 2007 is different story and you should not use them at all. Actually saving document with Office 2013 in "Office 97-2000 compatible" mode with password effectively means you're saving document with protection which will be cracked in seconds with rainbow tables.

Anyway, you can use RAR 3.x-5.x or 7zip archives for the same purpose. Protection there is as strong as password you've choose. No backdoors there and brute-forcing speed is really low too.


Another thing is that if you're using system without full disk encryption it's possible to find encryption keys used with Office 2013 document within swap file or hibernate image and get access to protected document. If somebody got access to your computer. Actually it's simply possible to undelete the file which was extracted from protected archive/document to temporary file. Also during editing process Office can save temporary files anywhere it wants, no guarantee at all.

So if you're paranoid enough you will be using full disk encryption (TrueCrypt is obvious choice). Of course back up-ing all important information on (several, independent) external HDD/DVD-RWs as encrypted volumes (also TrueCrypt here is obvious choice).

Office 2013 uses AES 256 with 100,000 spins of PBKDF2 using SHA-256
Actually it doesn't use PBKDF2 -- it simply reapplying SHA512 in a way like:
Code:
for (iteration=0; iteration<100000; iteration++) hash = SHA512(iteration # + hash)
but everything else is quite right Smiley.
lepirate
Hero Member
*****
Offline Offline

Activity: 541
Merit: 500


Garbochock


View Profile
May 07, 2014, 12:39:39 PM
Last edit: May 07, 2014, 08:09:12 PM by lepirate
 #20

I would encrypt it using other methods. Read this:
http://searchenterprisedesktop.techtarget.com/tip/Microsoft-Office-2013-crackable-so-look-to-Office-password-recovery
But Microsoft has maybe done something about that issue during the last 1 and a half years, I don't know, I don't use Office.
I'd stick with some trusted open-source encryption software anyway.
-Very much text here-
And that's what I get for not reading the article properly! Embarrassed
I feel really stupid right now...
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!