Structurally weak cipher

    PKZIP Classic ZipCrypto — Hashcat Mode 17200

    TL;DR — PKZIP's original encryption — informally called 'ZipCrypto' or 'ZIP 2.0 encryption' — is a stream cipher designed in 1989. Documented academic attacks reduce its effective security far below the nominal 96-bit key, making recovery feasible in most practical cases. Hashcat mode 17200 covers the standard ZipCrypto with full CRC verification.

    What ZipCrypto actually is

    PKZIP's original encryption was published in PKWARE's APPNOTE.TXT (the ZIP format specification) and remains the default for many archive utilities producing 'classic' password-protected ZIPs. It uses three 32-bit linear-feedback registers seeded by the password and updated per byte — a custom stream cipher, not a standard one.

    The cipher's nominal security level is 96 bits. In practice, academic cryptanalysis (Eli Biham and Paul Kocher, 1994; later refinements by Stay, Lewerentz, and others) has demonstrated key-recovery attacks that reduce the effective complexity by many orders of magnitude under specific conditions — particularly when an attacker has known plaintext (e.g., a known file in the archive or a recognisable file format header).

    From a recovery perspective, mode 17200 ZipCrypto archives are typically the most favourable archive case. The cipher's structural weakness means recovery often succeeds even without strong password hints.

    • Hashcat mode: 17200 (standard ZipCrypto)
    • Nominal cipher: 96-bit stream cipher
    • Known cryptanalytic weaknesses with plaintext
    • Default for legacy 'classic' password-protected ZIPs
    • Distinguished from 17210/17220/17225/17230 by CRC handling

    Why classic ZipCrypto is weak

    The cipher's three 32-bit registers form a small internal state. After processing the first 12 bytes (a header that includes a known 1-byte CRC check), the state is fully determined by the password. Attacks exploit relationships between observed cipher output and the small state space.

    When the archive contains files with predictable starting bytes (most file formats do — JPEG starts with FF D8, PDF starts with %PDF-, ZIP-within-ZIP starts with PK\x03\x04), known-plaintext attacks reduce the effective password search dramatically. This is sometimes informally called the 'Biham-Kocher' attack.

    Modern recovery tooling implements these attacks routinely. The combination of cipher weakness + typical file formats means most ZipCrypto archives are recoverable on tractable timescales.

    Identifying mode 17200

    ZipCrypto is identified by the general-purpose flag in the local file header. Bit 0 indicates encryption; bits 1-2 indicate compression options. The encryption method byte indicates ZipCrypto (vs WinZip AES, which uses extra fields).

    Tools like 7-Zip, unzip -v, or zipinfo print whether each entry uses 'ZipCrypto' or 'AES-256'. The mode-17200 hash format starts with `$pkzip2$1*1*` (or 2*, 3* for variants) followed by per-file metadata.

    Multi-file ZIP archives where each file is encrypted separately: each file produces its own hash, which Hashcat can target independently or jointly through mode variants 17210-17230.

    Mode 17200 vs WinZip AES (mode 13600)

    WinZip introduced AES-256 encryption for ZIP archives in WinZip 9.0 (2003). This is mode 13600 in Hashcat — categorically harder than 17200. AES-256 has no known practical attacks, so recovery feasibility for mode 13600 reduces to password complexity (similar to modern Office or PDF).

    If your archive uses 'AE-2' encryption (the standard for WinZip AES), it's mode 13600. If it uses 'classic' ZipCrypto, it's mode 17200. The ZIP file format accommodates both; many tools default to ZipCrypto for compatibility with older readers.

    Recovery realism for mode 17200

    The combination of cipher structural weakness and typical archive content (predictable file headers in JPEGs, PDFs, Office docs) makes most mode 17200 archives recoverable. Even without specific hints, known-plaintext attacks succeed on most files.

    Multi-file archives are particularly favourable: each additional file provides additional plaintext opportunities. A 10-file archive of typical office documents typically yields the cipher key within minutes on modern hardware.

    Specific recovery duration varies and we don't publish numbers — but mode 17200 sits comfortably on the 'practically recoverable' side of the line in almost all cases.

    Files commonly using ZipCrypto

    Default ZIP creation in Windows Explorer (built-in send-to compressed folder) uses ZipCrypto when password-protected. Many corporate document distribution systems default to ZipCrypto for compatibility with older recipients.

    Common sources in 2026: legal disclosure bundles from older case management systems, software distribution archives, accountant deliverables, contractor work products, and any password-protected ZIP from Windows-default tooling without WinZip explicitly installed.

    Frequently Asked Questions

    Is mode 17200 always recoverable?
    Effectively yes for most real-world archives. The combination of cipher structural weakness and predictable file content makes recovery feasible in most cases — particularly for multi-file archives.
    How is this different from WinZip AES?
    WinZip AES (mode 13600) uses AES-256 — no known practical attacks. Recovery for AES depends on password complexity. ZipCrypto (mode 17200) has structural weaknesses that make recovery feasible regardless of password.
    Can I tell from the .zip extension which mode I have?
    No — both ZipCrypto and WinZip AES files use .zip. Inspection tools (7-Zip, zipinfo, unzip -v) print the encryption method per file. The general-purpose flag and extra fields disambiguate.
    Are recovered files guaranteed unmodified?
    Yes. Recovery extracts the cipher key, then decrypts the file content. Decompressed content is byte-identical to what the original password-holder would extract.
    What about ZIP archives created by macOS?
    macOS ditto and Archive Utility can create ZipCrypto-encrypted ZIPs. Same cipher, same recovery characteristics — mode 17200.
    Does archive size affect recovery?
    Larger archives with more files often have more plaintext opportunities, which can speed recovery. Size alone isn't a barrier — file count and content predictability matter more.
    What if my archive only has one file?
    Single-file mode 17200 archives are still typically recoverable, but the recovery is slightly less favourable than multi-file. Specialised attacks for single-file ZipCrypto exist.

    Related references

    Have a file in this category?

    Start with a free analysis. The encryption type is detected automatically; a free check runs through fast techniques before any paid attempt. You only pay if recovery actually works.

    Run a free analysis