Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

octcrypt_b

Name: Anonymous 2013-01-26 3:43

my shiny new PRNG ^^ wtcha think /prog/?

function [dataout, dataKey] = genIIsched(numBytes)
dataKey = keyBlock();
Xorn = xornBuilder;
for(iter = 1:3)
  dataKey = keySched(dataKey);
  jarS(iter,:) = dataKey(9,:);
  endfor;
expVec(1:256) = 1;
dataout(1:ceil(numBytes/65536)*65536) = int16(0);
for (iter = 0:ceil(numBytes/65536)-1)
  dataKey = keySched(dataKey);
  bA = dataKey(9,:);
  dataKey = keySched(dataKey);
  bB = dataKey(9,:);
  blockA = bA(expVec, :);
  blockB = bB(expVec, :)';
  dataout(iter*65536+1:(iter+1)*65536) = jarS(3, Xorn( (jarS(1,blockA(:)) .- 1) .* 256 .+ jarS(2,blockB(:)) ));
  endfor;
endfunction;

Name: Anonymous 2013-01-26 4:05

stats:
2mb/sec keydata generator
possibly more secure than just using dataKey(9,:)? (!256 direct-gen)
turns 2x256 byte blocks to 1x65536 byte super-block using parallel xor w/ jar/cell anti-security counter-measures ^^
still possesses !256 properties ?! per row &/or column as a 256x256 mat (i've been wondering how to do that.... lol =)

Name: Anonymous 2013-01-26 4:57

/prog/ Challenge 3457 (Easy-ish)
Land a key recovery attack on the 2x256 byte seed given 'a' whole 65536 byte super-block output that did Not use the cell counter-measure

-----------------------------------------------------

/prog/ Challenge 8470 (mission: impossible ^^ )
Land a key recovery attack on the 2x256 byte seed given 'a' whole 65536 byte super-block output that Did use the cell counter-measure

Name: Anonymous 2013-01-26 6:49

Had to double-check, but yeah, 3457 is definitely do-able =) probably not a bad challenge either...
For clarity, the expansion method is a lot like a multiplication table, except the entries(/indices) are scrambled (dis-ordered) and it uses xor (/ xorn )

someone ? c'mon ^^

Name: Anonymous 2013-01-26 6:50

^^
Fuck off.

Name: Anonymous 2013-01-26 7:34

blah ^^
 
blah-blah U.U'

mmmbop-... xD

Name: Anonymous 2013-01-27 5:51

You sound like the output of a markov text generator written by a drunk retarded monkey.

Name: Anonymous 2013-01-27 6:02

aww thankyou ^^
but are you just covering for not being able to complete challenge 3457 ? i'll admit it was a little trickier than i thought.... Do you need clues? xD
>Land a key recovery attack on the 2x256 byte seed given 'a' whole 65536 byte super-block output that did Not use the cell counter-measure

Don't change these.
Name: Email:
Entire Thread Thread List