Overclock.net › Forums › Software, Programming and Coding › Networking & Security › Encryption Algorithm
New Posts  All Forums:Forum Nav:

Encryption Algorithm - Page 3

post #21 of 24
Thread Starter 
Quote:
Originally Posted by DuckieHo View Post
How did you check for patterns though?
.
I searched through it very carefully.. I don't know how else I'm supposed to do this total newb

Quote:
Originally Posted by DuckieHo View Post
A real test would be if you gave the algorithm and a resultset to someone... and ask them to find the key.
That's why I'm asking for a forum or a site or a community.. Because nobody I know is interested in that or has a specific skill in code breaking
My Rig
(14 items)
 
Ex-wife's Rig
(15 items)
 
 
CPUMotherboardGraphicsRAM
Core i5 4460 AsRock H81M-DG4 Sapphire Rx470 Platinum KVR 1600 16Gb 
Hard DriveHard DriveCoolingOS
2x Seagate 3Tb Samsung 850 EVO 120 Scythe Ninja 3 Rev.B Windows 10 Pro 
MonitorKeyboardPowerCase
Fujitsu Siemens A17-2A Logitech K280e SuperFlower SF-550K12XP Thermaltake Versa H25 
MouseAudio
Logitech G402 Sony MDR XD150 
CPUMotherboardGraphicsRAM
Athlon 750K 4.0Ghz AsRock FM2A75 Pro4+ Sapphire R9 270X Dual-X Kingston 2x4Gb 1600 
Hard DriveHard DriveOptical DriveCooling
Samsung 850 EVO 120  Western Digital 320Gb LiteON DVD-RW CoolerMaster Hyper Z600 
OSMonitorKeyboardPower
Windows 7 Pro x64 Toshiba 32" FullHD TV Logitech FSP Hexa 550 
CaseMouse
DeLUX Logitech 
  hide details  
Reply
My Rig
(14 items)
 
Ex-wife's Rig
(15 items)
 
 
CPUMotherboardGraphicsRAM
Core i5 4460 AsRock H81M-DG4 Sapphire Rx470 Platinum KVR 1600 16Gb 
Hard DriveHard DriveCoolingOS
2x Seagate 3Tb Samsung 850 EVO 120 Scythe Ninja 3 Rev.B Windows 10 Pro 
MonitorKeyboardPowerCase
Fujitsu Siemens A17-2A Logitech K280e SuperFlower SF-550K12XP Thermaltake Versa H25 
MouseAudio
Logitech G402 Sony MDR XD150 
CPUMotherboardGraphicsRAM
Athlon 750K 4.0Ghz AsRock FM2A75 Pro4+ Sapphire R9 270X Dual-X Kingston 2x4Gb 1600 
Hard DriveHard DriveOptical DriveCooling
Samsung 850 EVO 120  Western Digital 320Gb LiteON DVD-RW CoolerMaster Hyper Z600 
OSMonitorKeyboardPower
Windows 7 Pro x64 Toshiba 32" FullHD TV Logitech FSP Hexa 550 
CaseMouse
DeLUX Logitech 
  hide details  
Reply
post #22 of 24
Quote:
Originally Posted by ronnin426850 View Post
I searched through it very carefully.. I don't know how else I'm supposed to do this total newb
With just your eyes?

There are techniques to do so.... time-consuming though. You can try a forensic website but I doubt anyone would be interested.
Once again...
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 [4.28GHz, HT] Asus P6T + Broadcom NetXtreme II VisionTek HD5850 [900/1200] + Galaxy GT240 2x4GB G.Skill Ripjaw X [1632 MHz] 
Hard DriveOSMonitorKeyboard
Intel X25-M 160GB + 3xRAID0 500GB 7200.12 Window 7 Pro 64 Acer H243H + Samsung 226BW XARMOR-U9BL  
PowerCaseMouseMouse Pad
Antec Truepower New 750W Li Lian PC-V2100 [10x120mm fans] Logitech G9 X-Trac Pro 
  hide details  
Reply
Once again...
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7 920 [4.28GHz, HT] Asus P6T + Broadcom NetXtreme II VisionTek HD5850 [900/1200] + Galaxy GT240 2x4GB G.Skill Ripjaw X [1632 MHz] 
Hard DriveOSMonitorKeyboard
Intel X25-M 160GB + 3xRAID0 500GB 7200.12 Window 7 Pro 64 Acer H243H + Samsung 226BW XARMOR-U9BL  
PowerCaseMouseMouse Pad
Antec Truepower New 750W Li Lian PC-V2100 [10x120mm fans] Logitech G9 X-Trac Pro 
  hide details  
Reply
post #23 of 24
I don't have time for a full response yet (Sorry, have been busy )

"Take the 4-th bit of the data binary – 0
After it, insert the bit from the key binary."
Do you mean every fourth bit of the 'data'?

Since you 'insert' a bit, how is the message size affected? Likely, most data are of some power of two, thus any odd length will show the number of affected bits by insertion, from which one could perhaps move forward with an attack.

Also, I am not sure I understand this section:
/*
Take the first bit of the key binary – 0
Take the first bit of the data binary after insertion – 0
Key bit = 0, do nothing.

Take the second bit of the key binary – 1
Take the second bit of the data binary after insertion – 1
Key bit = 1, change data bit. Data bit = 1 => Data bit = 0

Etc.
*/
When does this come within the process? For every altered bit you then AND it with the adjacent bit to produce the final result?

Will get sleep and become human soon, I hope
For sale
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7-920 Asus P6T Deluxe Asus GTX460 TOP 768mb G Skill ECO 1600 CAS7 1.35V 
Hard DriveOptical DriveOSMonitor
2x Vertex 60 GB raid[0] Asus DVDRW W7,Ubuntu 2 xAsus VH236H 
KeyboardPowerCaseMouse Pad
Razer Ultra X3 1000W HAF 932 My Desk 
  hide details  
Reply
For sale
(13 items)
 
  
CPUMotherboardGraphicsRAM
i7-920 Asus P6T Deluxe Asus GTX460 TOP 768mb G Skill ECO 1600 CAS7 1.35V 
Hard DriveOptical DriveOSMonitor
2x Vertex 60 GB raid[0] Asus DVDRW W7,Ubuntu 2 xAsus VH236H 
KeyboardPowerCaseMouse Pad
Razer Ultra X3 1000W HAF 932 My Desk 
  hide details  
Reply
post #24 of 24
Thread Starter 
Quote:
Originally Posted by cdolphin View Post
I don't have time for a full response yet (Sorry, have been busy )

"Take the 4-th bit of the data binary – 0
After it, insert the bit from the key binary."
Do you mean every fourth bit of the 'data'?

Since you 'insert' a bit, how is the message size affected? Likely, most data are of some power of two, thus any odd length will show the number of affected bits by insertion, from which one could perhaps move forward with an attack.
No, not every 4-th. For a key of 458, first insert the 4-th bit of the key after the 4-th bit of the data, then insert the 5-th bit of the key after the 9th bit in the data, then take the 8-th bit of the key, and insert it after the 16th bit in the data and so on.
The only requirement is to be divisable by 8. The size of the result is usually 125-175% the size of the original data, depending on the key. A key of 1010101010101 will produce larger result than a key of 9898989898989. But since the original size is not public, the increase should not be able to base an attack.. At least that's what I think. I mean you'll still need either the key or the original data to get a clue about the size differences.

Quote:
Originally Posted by cdolphin View Post
Also, I am not sure I understand this section:
/*
Take the first bit of the key binary – 0
Take the first bit of the data binary after insertion – 0
Key bit = 0, do nothing.

Take the second bit of the key binary – 1
Take the second bit of the data binary after insertion – 1
Key bit = 1, change data bit. Data bit = 1 => Data bit = 0

Etc.
*/
When does this come within the process? For every altered bit you then AND it with the adjacent bit to produce the final result?
Yes, exactly
In the first implementation I made, this whole process came after the whole insertion process, but I'll soon change it, to have an insertion, a shift, an insertion, a shift and so on, on per-bit basis.

Thank you for taking the time
Edited by ronnin426850 - 12/31/10 at 11:13am
My Rig
(14 items)
 
Ex-wife's Rig
(15 items)
 
 
CPUMotherboardGraphicsRAM
Core i5 4460 AsRock H81M-DG4 Sapphire Rx470 Platinum KVR 1600 16Gb 
Hard DriveHard DriveCoolingOS
2x Seagate 3Tb Samsung 850 EVO 120 Scythe Ninja 3 Rev.B Windows 10 Pro 
MonitorKeyboardPowerCase
Fujitsu Siemens A17-2A Logitech K280e SuperFlower SF-550K12XP Thermaltake Versa H25 
MouseAudio
Logitech G402 Sony MDR XD150 
CPUMotherboardGraphicsRAM
Athlon 750K 4.0Ghz AsRock FM2A75 Pro4+ Sapphire R9 270X Dual-X Kingston 2x4Gb 1600 
Hard DriveHard DriveOptical DriveCooling
Samsung 850 EVO 120  Western Digital 320Gb LiteON DVD-RW CoolerMaster Hyper Z600 
OSMonitorKeyboardPower
Windows 7 Pro x64 Toshiba 32" FullHD TV Logitech FSP Hexa 550 
CaseMouse
DeLUX Logitech 
  hide details  
Reply
My Rig
(14 items)
 
Ex-wife's Rig
(15 items)
 
 
CPUMotherboardGraphicsRAM
Core i5 4460 AsRock H81M-DG4 Sapphire Rx470 Platinum KVR 1600 16Gb 
Hard DriveHard DriveCoolingOS
2x Seagate 3Tb Samsung 850 EVO 120 Scythe Ninja 3 Rev.B Windows 10 Pro 
MonitorKeyboardPowerCase
Fujitsu Siemens A17-2A Logitech K280e SuperFlower SF-550K12XP Thermaltake Versa H25 
MouseAudio
Logitech G402 Sony MDR XD150 
CPUMotherboardGraphicsRAM
Athlon 750K 4.0Ghz AsRock FM2A75 Pro4+ Sapphire R9 270X Dual-X Kingston 2x4Gb 1600 
Hard DriveHard DriveOptical DriveCooling
Samsung 850 EVO 120  Western Digital 320Gb LiteON DVD-RW CoolerMaster Hyper Z600 
OSMonitorKeyboardPower
Windows 7 Pro x64 Toshiba 32" FullHD TV Logitech FSP Hexa 550 
CaseMouse
DeLUX Logitech 
  hide details  
Reply
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Networking & Security
Overclock.net › Forums › Software, Programming and Coding › Networking & Security › Encryption Algorithm