Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

detect encryption method

Name: Anonymous 2006-06-09 19:39

Is there a tool that automatically looks if popular encryption methods were used on a text if I have the decrypted as well as encrypted text?
If you don't know a tool could you please at least advise me to a forum where I could get some help with this.

Name: Anonymous 2006-06-09 20:08

gb2/comp/

Name: Anonymous 2006-06-09 23:03

>>1
I doubt it, as far as I know unless there is an unencrypted header the encrypted data appears as nothing more than random information. You can only tell what the encryption is if you succeed in decrypting it into something understandable.

Name: Anonymous 2006-06-10 1:21

Short answer: No.

Long answer: Nooooooooooooooooooooooooooooooooo.

Name: Anonymous 2006-06-10 1:40 (sage)

10 bux says >>1 is the OP of the data miner thread.

Name: Anonymous 2006-06-10 2:16

>>1
Actually, there is.  The method you must employ invovles HDFHEBNR$)*#NNCJK IJKEF J#R OIFJDV)(*J# $HJF)(* UIND OIN EFJ)$# )(FJOKJDNF (HJ#R)(UFE) FD)IME)F J)($#JR OIEWFJREFOEWJROEWJROE )(*U#R )UJRG)IJ FKLV R)(T$ )(U)($T)(%)(U$%LK GFRMNKL RG

Name: Anonymous 2006-06-10 3:14

>>3
I said I have the decrypted message as well

>>5
you just lost 10 bux.

Name: Anonymous 2006-06-10 4:13

>>1,7
Hi.

This is /prog/ when in /prog/ you do as /prog/ does.
Here in /prog/ we do not ask where to get lolhax.exe, you program lolhax.exe.

Assuming that you did really intend to program lolhax.exe, and that you have both the encrypted text and decrypted text.

If it is true, here's what you do. you use the decrpyted text and run various encryption algo's on it to see if you get the same encrypted text result.

If you have no clue what I just said, /comp/ is just straight down the aisle and to the right.

Name: Anonymous 2006-06-10 4:52

>>8
I did have the intention to write a programm though it wasn't loadhax.exe.
I just need to find out the encryption method in order to use it for the programm I was gonna write.
But nvm, I get the point. This board is just for either questions that give the PROgrammers here the chance to show how friggin elite they are or for threads that mutate into the typical 'language x is superior to all others' threads

Name: Anonymous 2006-06-10 5:41

>>9
Good, you finally understood what this board is all about. Now join us or leave.

This post is Web 2.0 compatible

Name: Anonymous 2006-06-10 6:08

>>10 is right, though IMHO it would have been better had he have written
if(!joinus){return 0;}

Name: Anonymous 2006-06-10 10:16

There are programs out there which use the features of the ciphertext and armoring to determine what they think it is.

Name: Anonymous 2006-06-10 11:47

>>1
differential cryptanalysis motherfucker, do you use it?

Name: Anonymous 2006-06-11 2:03

>>7
Buy you don't know the password/seed used to encrypt the data so unless the encryption method is vulnerable to that specific type of attack (and you dont know the method anyway) it doesnt help much.

Name: Anonymous 2006-06-11 7:01

>>1
With your skills? NO.

Name: Anonymous 2008-01-29 7:23

[eop]test[/eop]
test2

[b]whut[/b]

Name: Anonymous 2011-08-08 16:01

the lack of sage in this thread makes for an excellent example of a bad /prog/ thread.

fuck fuck fuck

Name: Sgt.Kabu寯�kiman֞謹 2012-05-28 19:22

Bringing /prog/ back to its people
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy

Don't change these.
Name: Email:
Entire Thread Thread List