Crack this
1
Name:
Anonymous
2011-09-22 18:50
I decided to spend 5 minutes making a xor encryption thing.
http://pastebin.com/Zmf9C5yj
Can you crack this?
HEX: 2a543e5f3e38650d5e6e4e4de5be446a17751a751e7c577b012b10271c27542b15
2
Name:
Anonymous
2011-09-22 18:51
Yes I can crack that but I'm not going to bother.
3
Name:
Anonymous
2011-09-22 18:54
Maybe I have military grade encryption then.
4
Name:
Anonymous
2011-09-22 19:00
DA5CAE33789E8D00A8E1D2DACDC44A44C58F91369999FE4678769A3F9450
6F16C98212F7270E8201D856C8262417535452FBFC52CDEC977607702853
847CF5040BDA9EAF98C4CE0E54136C5CFC6BBE72541B5003C8F4DFB5BEE6
BB89EB076DA678551B50C1A53F1F6FEA2F7D2298D806F050F738DB281248
7BA2F476EA8169528FAA589C076CB0CF4349CC0FE9DD5EF771FB6A0E5413
CEF67F370D4E3404191BAB68641F2C106FD277BB5CF29CAF66259F16271B
F6A2E3C6846D0F60038D7E01E8EB529D
5
Name:
Anonymous
2011-09-22 19:03
ooc.crypto
6
Name:
Anonymous
2011-09-22 21:38
google n3n7i lotus ...?
...Uses three revolving look-up tables (8-bit words / via Factorial 256) to 'Destroy' linear Xor properties
aka 'Jar' / 'Cell' ? (i read two is sufficient, three couldn't be worse..? sec-wise)
...lotus is a keyed hash though, -One way encrypt by design-
7
Name:
Anonymous
2011-09-22 21:47
A -> a (Perfect Hash of 8-bit Key)
B -> b (Perfect Hash of 8-bit Input)
a Xor b = C (Xor)
C -> c (Perfect Hash of 8-bit Output)
...The Cell // Jar method
[a Xor b = C] <- Inside the Jar
[A, B, c] <- Outside the Cell
8
Name:
Anonymous
2011-09-22 23:20
...You could say it uses four keys ([1 of 256 Bytes] from each of 3 'Jars') + a one byte proper key... per Xor-Cell (Axis) op
>>1 Are you just using Xor and bit rotates? // +1 Bit for unknown keySize [Testing all keys upto x bit == x+1 bit strength...]
...Why is personal security and national security mutually exclusive..? if terrorists can steal your id... how is the nation secure??
9
Name:
Anonymous
2011-09-23 2:57
10
Name:
Anonymous
2011-09-23 6:00
/prog/ needs more threads like this.
11
Name:
Anonymous
2011-09-23 6:17
Why did you stop using your name,
>>6-8 ? Now I can't filter your posts anymore.
12
Name:
Anonymous
2011-09-23 7:17
>>11
easily filtered /\.\.\.\w+/gim
13
Name:
Anonymous
2011-09-23 10:16
>>12
filter this
heehee .. =) . . . .
malloc hee heeheehee .. =)
=) =) =)
14
Name:
Anonymous
2011-09-23 10:29
/\.\.\.\w+|heehee|\=\)\s+\=\)|\.\s+\.\s+\s+\./gim
15
Name:
Anonymous
2011-09-23 10:34
>>14
optimized /\.\s*\.\s*\.|\=\)\s+\=\)/gim
16
Name:
Anonymous
2011-09-23 10:59
>>13-15
This is why I love /prog/.
17
Name:
Anonymous
2011-09-23 11:05
WHIP IT
DEVO
crack that whip
give the past the slip
step on a crack
break your momma's back
when a problem comes along
you must whip it
before the cream sits out too long
you must whip it
when something's going wrong
you must whip it
now whip it
into shape
shape it up
get straight
go forward
move ahead
try to detect it
it's not too late
to whip it
whip it good
when a good time turns around
you must whip it
you will never live it down
unless you whip it
no one gets their way
until they whip it
i say whip it
whip it good
18
Name:
Anonymous
2011-09-24 15:55
>>1
Do uninitialized local integer variables start off with a value of zero in Go? I'm having trouble finding out online and I don't want to install the interpreter.
19
Name:
Anonymous
2011-09-24 19:05
20
Name:
Anonymous
2011-09-24 21:27
21
Name:
Anonymous
2011-09-24 21:43
>>1 don't suppose you could write it in pseudocode?
3 << anything with military and encryption in its name is probably snake oil, unless you're actually in the army..
Newer Posts