Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Crack this

Name: Anonymous 2011-09-22 18:50

I decided to spend 5 minutes making a xor encryption thing.
http://pastebin.com/Zmf9C5yj

Can you crack this?

HEX: 2a543e5f3e38650d5e6e4e4de5be446a17751a751e7c577b012b10271c27542b15

Name: Anonymous 2011-09-22 18:51

Yes I can crack that but I'm not going to bother.

Name: Anonymous 2011-09-22 18:54

Maybe I have military grade encryption then.

Name: Anonymous 2011-09-22 19:00


DA5CAE33789E8D00A8E1D2DACDC44A44C58F91369999FE4678769A3F9450
6F16C98212F7270E8201D856C8262417535452FBFC52CDEC977607702853
847CF5040BDA9EAF98C4CE0E54136C5CFC6BBE72541B5003C8F4DFB5BEE6
BB89EB076DA678551B50C1A53F1F6FEA2F7D2298D806F050F738DB281248
7BA2F476EA8169528FAA589C076CB0CF4349CC0FE9DD5EF771FB6A0E5413
CEF67F370D4E3404191BAB68641F2C106FD277BB5CF29CAF66259F16271B
F6A2E3C6846D0F60038D7E01E8EB529D

Name: Anonymous 2011-09-22 19:03

ooc.crypto

Name: Anonymous 2011-09-22 21:38

google n3n7i lotus ...?

...Uses three revolving look-up tables (8-bit words / via Factorial 256) to 'Destroy' linear Xor properties

aka 'Jar' / 'Cell' ? (i read two is sufficient, three couldn't be worse..? sec-wise)

...lotus is a keyed hash though, -One way encrypt by design-

Name: Anonymous 2011-09-22 21:47

A -> a   (Perfect Hash of 8-bit Key)

B -> b   (Perfect Hash of 8-bit Input)

a Xor b = C  (Xor)

C -> c   (Perfect Hash of 8-bit Output)

...The Cell // Jar method
[a Xor b = C] <- Inside the Jar

[A, B, c] <- Outside the Cell

Name: Anonymous 2011-09-22 23:20

...You could say it uses four keys ([1 of 256 Bytes] from each of 3 'Jars') + a one byte proper key... per Xor-Cell (Axis) op

>>1 Are you just using Xor and bit rotates? // +1 Bit for unknown keySize [Testing all keys upto x bit == x+1 bit strength...]

...Why is personal security and national security mutually exclusive..? if terrorists can steal your id... how is the nation secure??

Name: Anonymous 2011-09-23 2:57

>>6-8
cretin

Name: Anonymous 2011-09-23 6:00

/prog/ needs more threads like this.

Name: Anonymous 2011-09-23 6:17

Why did you stop using your name, >>6-8? Now I can't filter your posts anymore.

Name: Anonymous 2011-09-23 7:17

>>11
easily filtered  /\.\.\.\w+/gim

Name: Anonymous 2011-09-23 10:16

>>12
filter this

heehee .. =) . . . .
malloc hee heeheehee .. =)
=) =) =)

Name: Anonymous 2011-09-23 10:29

/\.\.\.\w+|heehee|\=\)\s+\=\)|\.\s+\.\s+\s+\./gim

Name: Anonymous 2011-09-23 10:34

>>14
optimized /\.\s*\.\s*\.|\=\)\s+\=\)/gim

Name: Anonymous 2011-09-23 10:59

>>13-15
This is why I love /prog/.

Name: Anonymous 2011-09-23 11:05

WHIP IT
DEVO

crack that whip
give the past the slip
step on a crack
break your momma's back
when a problem comes along
you must whip it
before the cream sits out too long
you must whip it
when something's going wrong
you must whip it
  now whip it
  into shape
  shape it up
  get straight
  go forward
  move ahead
  try to detect it
  it's not too late
  to whip it
  whip it good
when a good time turns around
you must whip it
you will never live it down
unless you whip it
no one gets their way
until they whip it
i say whip it
whip it good

Name: Anonymous 2011-09-24 15:55

>>1

Do uninitialized local integer variables start off with a value of zero in Go? I'm having trouble finding out online and I don't want to install the interpreter.

Name: Anonymous 2011-09-24 19:05

>>6-8
fuck off

Name: Anonymous 2011-09-24 21:27

>>19 have a cry

Name: Anonymous 2011-09-24 21:43

>>1 don't suppose you could write it in pseudocode?

3 << anything with military and encryption in its name is probably snake oil, unless you're actually in the army..

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List