Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Crack this

Name: Anonymous 2011-09-22 18:50

I decided to spend 5 minutes making a xor encryption thing.
http://pastebin.com/Zmf9C5yj

Can you crack this?

HEX: 2a543e5f3e38650d5e6e4e4de5be446a17751a751e7c577b012b10271c27542b15

Name: Anonymous 2011-09-22 21:38

google n3n7i lotus ...?

...Uses three revolving look-up tables (8-bit words / via Factorial 256) to 'Destroy' linear Xor properties

aka 'Jar' / 'Cell' ? (i read two is sufficient, three couldn't be worse..? sec-wise)

...lotus is a keyed hash though, -One way encrypt by design-

Name: Anonymous 2011-09-22 21:47

A -> a   (Perfect Hash of 8-bit Key)

B -> b   (Perfect Hash of 8-bit Input)

a Xor b = C  (Xor)

C -> c   (Perfect Hash of 8-bit Output)

...The Cell // Jar method
[a Xor b = C] <- Inside the Jar

[A, B, c] <- Outside the Cell

Name: Anonymous 2011-09-22 23:20

...You could say it uses four keys ([1 of 256 Bytes] from each of 3 'Jars') + a one byte proper key... per Xor-Cell (Axis) op

>>1 Are you just using Xor and bit rotates? // +1 Bit for unknown keySize [Testing all keys upto x bit == x+1 bit strength...]

...Why is personal security and national security mutually exclusive..? if terrorists can steal your id... how is the nation secure??

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List