Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Comparing algorithm

Name: Anonymous 2007-08-29 12:47 ID:B57P0m0u

I'm working on a program that basically compares strings to find similarities in the way the have been generated, and so it finds the encryption key. More are the strings, better are the results...basically, with this you can create any keygen ( not only for piracy, but also for testing serial code algorithms )...It's simply to do I know, but I want to optimize the code to have more accuracy in the results. I wrote a bit of it in C ( the final version will be wrote in Python ) but I'll post it later, because it's too buggy for now and also I need suggestion about optimizing the algorithm...any idea about improving the speed? I use recursive functions and for cycles for doing the comparitions, and for now a bit of inline assembly for memory handling.
I'm also working with a different version of the program to decode tripcodes, or at least for finding the key to decode them all....I know their algorithm is very weak and they are already been decoded, but I want to do something better decoding also secure tripcodes. Ideas?

Name: Anonymous 2007-08-29 13:00 ID:bSI/Xqv7

I wrote a bit of it in C ( the final version will be wrote in Python )

What the fuck.

Surely it makes more sense to prototype the other way 'round?

Name: Anonymous 2007-08-29 13:01 ID:gkTZH/dt

OK, tripcodes and many registration keys are generated by a crypto hash function, typically MD5/SHA.

To find the key to decode a tripcode, you have to break a hash function -- that is, given T and H (tripcode and hash funct.), you have to find T=H(S). Finding S given H and T is extremely hard -- it's called preimage resistance, which is a guiding property of hash functions.

What does this all mean? Well, it's simple, really...

If you think you can break a hash given a large number of inputs, you don't know enough about mathematics and computer science to do jack shit. GTFO

Your entire premise is fucked. Please LEARN2HASH and try again.

Name: Anonymous 2007-08-29 13:16 ID:LWIKMePt

this thread is awesome!

Name: Anonymous 2007-08-29 13:54 ID:Heaven

This should be in the "fictional programming" thread.

Name: Anonymous 2007-08-29 14:06 ID:pLe+mdjI

>>3
I have the impression that registration keys are mostly hacked together ad-hoc with little understanding of the mathematics, in true GAME PROGRAMMER style.
They may be vulnerable to pattern analysis, though >>1 is not the man to do it.
The "I wrote a bit of it in C ( the final version will be wrote in Python )" part does kind of give it away as a troll, though.

Name: Anonymous 2007-08-29 14:18 ID:Heaven

>>6
Many may be, yes. But no company worth their salt would do that for long.

GET IT, A CRYPTOGRAPHY PUN? WORTH THEIR SALT? HAHAHAHA

Name: Anonymous 2007-08-29 14:23 ID:Heaven

inputting as many 5's as the installer will allow you to actually works for more things than you'd expect.
i lol'd muchly when i tried that and it worked for visual studio 4 (which i obtained legally but then lost the cd key for) several years ago.

Name: Anonymous 2007-08-29 14:31 ID:Heaven

>>8
Welcome to 2007... that shit don't fly no mo. People don't actually use 12 digit CD keys that are only numbers.

Name: Anonymous 2007-08-29 14:46 ID:sJnaRv/F

>>1
You must implement the <=> operator, it is a critical component of most computer systems.

Name: Anonymous 2007-08-29 15:48 ID:e3UEbEh0

>>10

%macro <=> 2
jmp %2
%endmacro

use like

<=> eax __label


:D

Name: Anonymous 2007-08-29 16:29 ID:sTTqiWJI

>>11
Hardcore.

Name: Anonymous 2007-08-29 18:52 ID:B+QxErfm

Some assemblers might have trouble parsing that; I suggest using the mnemonic JLEG (Jump if Lesser or Equal or Greater), or maybe JBEA (Jump if Below or Equal or Above).

Name: Anonymous 2007-08-29 19:44 ID:AqdgV6vS

>>13
Hahahaverygood

Name: Anonymous 2007-08-29 19:47 ID:pLe+mdjI

>>13
Well, clearly you need both, one for signed and one for unsigned arithmetic.

Name: Anonymous 2007-08-30 5:24 ID:6A18dYW2

I'll write the full version in python because I want to make it a lightweight, portable script, not because I'm a troll.

Name: Anonymous 2007-08-30 7:02 ID:tA4A8Sum

Sussman could take a look at the original tripcode source, see a tripcode, and say "that's obviously the hash for key XYZ", all while he listens to two other conversations, signs autographs with one hand, and writes a Lisp program with a Dvorak keyboard with the other.

Name: Anonymous 2007-08-30 7:49 ID:CfZ+Ch2O

>>17
Meanwhile, who's walking the dog?

Name: Anonymous 2007-08-30 8:01 ID:KekOy9UR

>>17
LOL!

Name: Anonymous 2009-03-06 9:22

CRYPTOGRAPHY and network security   2 No My   college is a   pain if you   wanted a silly   solution for counting.

Name: Anonymous 2010-12-27 9:28

Name: Anonymous 2010-12-27 11:46


Don't change these.
Name: Email:
Entire Thread Thread List