cryptanalysis Questions

5

I have sent 10000 mails to our customers and each mail had a link of the format http://example.com/LogIn?key={guid} Unfortunately the guid I sent were random guids (test data generated by Guid....
Topography asked 3/5, 2009 at 12:1

5

I'm not sure how exactly to word this question, so here's an example: string1 = "THEQUICKBROWNFOX" string2 = "KLJHQKJBKJBHJBJLSDFD" I want a function that would score string1 higher than string2 ...
Nimbus asked 29/7, 2011 at 19:51

1

I am looking for tools (preferably free) to practice various cryptoanalysis and cryptography techniques. Something along the lines of following two online tools but with more techniques. http://ww...
Rigid asked 22/8, 2013 at 10:25

1

Solved

I am curious about how password recovery works for password protected files. And I want to know the exact flow of the 7-zip encryption mechanism. 7-zip uses AES-256 encryption algorithm in CBC mod...
Sixtyfourmo asked 18/9, 2012 at 4:28

2

Solved

What is the difference between a multi-collision in a hash function and a first or second preimage. First preimage attacks: given a hash h, find a message m such that hash(m) = h. Second preimage...

9

Solved

Imagine I have this: $cdata = AES_256($data, $pass); AES_256 implements the AES algorithm. If I know the content of $cdata and the content of $data and also have the AES_256() code, can I reve...
Bernadettebernadina asked 1/5, 2009 at 7:40

4

When I hear about methods for breaking encryption algorithms, I notice there is often focused on how to decrypt very rapidly and how to reduce the search space. However, I always wonder how you can...
Knickers asked 2/9, 2010 at 9:14

3

How do brute-force attacks on encrypted data know when they've found the right key to decrypt the data? Is there a way to know that data's been decrypted, other than having a human looking at...
Floreated asked 16/6, 2010 at 18:21
1

© 2022 - 2024 — McMap. All rights reserved.