PDF Password Cracks and Hacks
The early controls relied upon manual entry of either one or two passwords which allowed the user to override the controls initially placed on the document. The commonest method of attacking an encrypted PDF document is to try and break the 40 bit key implementation (the default if security has been selected). Advertisers such as www.crackpassword.com claim to provide a solution for Version 4 products that guarantees to break that level of protection in 4 days or less using an exhaustive attack (if only Manager password was set then the process is instantaneous). Version 5 products claim to be attackable by organizations such as www.lostpassword.com/acrobat.htm or PDF-Password-Recovery using advanced techniques, although they warn that the 128 bit algorithm itself cannot be practically attacked using brute force.
Fortunately (or unfortunately for some!) most attacks are speeded up significantly by the choice of ‘poor’ passwords (8 characters or less that are common words). Whilst the 128 bit PDF encryption algorithm may be good, the choice of a poor password, so that users can remember it, defeats all the good technical work. One site www.password-crackers.com will decrypt Adobe PDF files regardless of whether they have user or owner passwords set and regardless of whether they are protected by 40 bit or 128 bit encryption.
But users don’t even need to crack the PDF encryption in order to share PDF files with others. They can just forward the encrypted PDF along with the password. This of course defeats the purpose of using PDF encryption if your main goal was to prevent unauthorized sharing.
Clearly the use of passwords for PDF encryption (or encryption of any other document) is not the way forwards! In fact, we predict that password protected PDF documents will become obsolete by 2020 as industry looks towards more secure solutions such as PDF DRM for document sharing.
PDF encryption security is in the process of moving towards using more secure methods such as public key technologies for document protection. A number of companies have moved into this space adding their own approaches to PDF encryption, but they over-complicate the approach and do not supply any key management, making their systems impossible to manage. Some older products even had security flaws, such as plug-in systems where the key required to decrypt the PDF file is handed over to Adobe for processing – see PDF security flaws.
Famously, in 2001 a programmer from Elcomsoft was prosecuted in the USA for publishing a program for removing PDF copyright protection on FileOpen PDF DRM products by attacking this weakness in the system.