Security Basics mailing list archives
Re: discover encryption method
From: richard () tortoise demon co uk
Date: Tue, 08 Jan 2008 16:53:59 +0000
On Tue, 8 Jan 2008 11:15:13 +0200 (IST), Alexander Klimov <alserkli () inbox ru> wrote:
Post some examples of `encryption' of, say, `a' repeated different number of times and same for `b': if the method is weak you will see repetitions in the ciphertext or constant difference between results for `a' and `b'.
Thanks for your help Alexander. I can't see anything repeated here, or any constant difference. Below shows first the plaintext followed by the corresponding ciphertext. Regards, Richard /***********************/ a CCMCAAJEGDBEICEHOPHBAEAAJEOOEDEBCACCCDCLJHPMJHGLOAHGLAOIOEEEJNNEIIEINDICECHPGEGAACDBIELEEDFFCOAAEIBNKAIAEBGAGCAFADOAKEBPGLHDAAKGCPIEKDAKACEGOBMCDAKGMJDAIBKAGACEMEJAOD aa BOBDAAHGDMJNEEMBIDOGCGACFEEDOEHBOCIDCBICOBFHABEFKANCNBFEGBHPEAFDCNIDKBAFECLPDLBHGFCGAILAGEHJJCHFADBEMEKHIENFHLACEBKLJKHDEDEGNECBKEBDLNOEDFJBEHJMHEAGMCHPACKJICACACODMDHELAHOLIHOJCGKOAJNGB aaa LMIDAADAICICCEILKFHHGFBKMBIENOLBKCLNLOACKBNKAGACGBLDIEAOGIAFCFOCKEFDDLLFAAIEMECDAFECFGMMGABEEBLEOEHPCDONNCJPNFIABPMCHIEIHNPKBKKIHAIJMLKPCLPGACFOJCIEEGBHIFIGMCAPDFGECBKCABIAIAGLPNMFECPNCAKCACJJEDJLOBBBGEGEEDACKF aaaa JJOCAAACEEAJKMIANHBMMHBEGBEGAFFBCFDNCOKJHLMECCNGOEACECHPCBIMKMANOIJBJJPHAFHDOCAFMDGGEAJEOIMCMPAHIBCDIAKBIDBFACAMLEDNDLPNCDHNBJKBKECKDKADLEKGIKLDADBFEBIEOMELGEMLCGICACBEMCBEAA aaaaa FGFDAAHHIADJEDFPHLKBKAMACDELKEJBKDBJEBEIAAKDEDBEACGABLKGABLFJMMOLCDKNAACMCNAKEMAHMHDACKBODNDKNLDICMDFNIHHDJFEBNGMFMBGCDDJABEMDACIEPNCBHNNGLNBHNLOJAOMNLDGABFOFMJGDBFIBBFEKBMJJCDIPICCIGGCNDAMEDEKFGAOE b EADDAAEGKNJBKOMJCDMFKBDAAEMBGAIBOELEEEHHOLLEIFCFNMLGDFIIAJCDEFELMCADBBOFNBGAIDBKAMPIBBCCCCDEKEKDKFPGIJCIHAHHACLFGKPBJBDBIAKBMBJKBHCOEKMJKABNONAFMEGLICNCMEIGEAIAGECEOAHHBFDOAEBECBNJFBLDKDGAKC bb ELBDAAHPAFAPOKIGGAHPACEAPHLAECHBMBBJNECDAEBHKDLHOHCMAEIDOBJFDACEEDFHODLDCFDBMODEEACLPBAJCEHIIFGPNBIBEIHDABIDAADCMDFBHBNGECGKIBAFCBICCDBEGEDGJDIHBKACACHOGIIEDFNKAOKDIDPBADKBEFPNOEOGAIJIPF bbb DLPCAAIDKBDAIEELKCPFKDICOAAFOCGBGCPGADADGGDAACCALGDECBJKAPBHICCMLENGGBJOOMKCECDCKACEEEPNIAKDOBNIIPKBEALFCAHHGAAPCNMHOHIKKABDCCCPPPNLFEGBFFOKCNDCAAHIJPMMCDFCLILEDCEIDBIADDAMLFGHAF bbbb OGOCAAMEEAKBJFHDOEBFGDAFCBMIBFFBGBEFFAJLFHJBEBHLGACEIBDCCCPNKEKCCAEILABMPGIDIDAOLEDECGICACBEODNNFBAOJNNMFIDBEPPHKCOGICJBKBFKJMHCBGAHCEGKPCHPAAJPHBMDCICEAFBFEDPPHEBDIEDCIAGCHJ bbbbb BEFDAAIFEEBFIFMKKNKEAIDCGFDCKFJBMCHLCAAADACKCEAEADIJDOBFKIEAFBKGOBEICDPBAFHJGGJKMLIBHLCHLGCEIACEKADDHDDAGEHHMDDMCEJBEEPILLOGEBMAAEJDKDJFKCPKKFPNODPJACGPGLKGEGHGPPBAMIHDACGGENBFMBIDGDGAEFIDOFIEEKJBOA
Current thread:
- discover encryption method richard (Jan 07)
- Re: discover encryption method Bipin Upadhyay (Jan 07)
- Re: discover encryption method richard (Jan 07)
- Re: discover encryption method Alexander Klimov (Jan 08)
- Re: discover encryption method richard (Jan 08)
- Re: discover encryption method Tofig Gasanov (Jan 08)
- Re: discover encryption method Alexander Klimov (Jan 09)
- Re: discover encryption method richard (Jan 07)
- RE: Re: discover encryption method Worrell, Brian (Jan 08)
- Email security - gateway WALI (Jan 08)
- RE: Email security - gateway Bill Lavalette (Jan 08)
- Re: Email security - gateway Josh Haft (Jan 08)
- Re: Email security - gateway John Mason Jr (Jan 08)
- RE: Email security - gateway Krzyston, Randy (Jan 09)
- RE: Email security - gateway Wilson Mosquera Q. (Jan 09)
- Re: discover encryption method Bipin Upadhyay (Jan 07)
- Re: Email security - gateway Deanosaur (Jan 09)