cryptanalysis Questions
5
I have sent 10000 mails to our customers and each mail had a link of the format
http://example.com/LogIn?key={guid}
Unfortunately the guid I sent were random guids (test data generated by Guid....
Topography asked 3/5, 2009 at 12:1
5
I'm not sure how exactly to word this question, so here's an example:
string1 = "THEQUICKBROWNFOX"
string2 = "KLJHQKJBKJBHJBJLSDFD"
I want a function that would score string1 higher than string2 ...
Nimbus asked 29/7, 2011 at 19:51
1
I am looking for tools (preferably free) to practice various cryptoanalysis and cryptography techniques. Something along the lines of following two online tools but with more techniques.
http://ww...
Rigid asked 22/8, 2013 at 10:25
1
Solved
I am curious about how password recovery works for password protected files. And I want to know the exact flow of the 7-zip encryption mechanism.
7-zip uses AES-256 encryption algorithm in CBC mod...
Sixtyfourmo asked 18/9, 2012 at 4:28
2
Solved
What is the difference between a multi-collision in a hash function and a first or second preimage.
First preimage attacks: given a hash h, find a message m such that
hash(m) = h.
Second preimage...
Bondy asked 29/7, 2009 at 8:59
9
Solved
Imagine I have this:
$cdata = AES_256($data, $pass);
AES_256 implements the AES algorithm.
If I know the content of $cdata and the content of $data and also have
the AES_256() code, can I reve...
Bernadettebernadina asked 1/5, 2009 at 7:40
4
When I hear about methods for breaking encryption algorithms, I notice there is often focused on how to decrypt very rapidly and how to reduce the search space. However, I always wonder how you can...
Knickers asked 2/9, 2010 at 9:14
3
How do brute-force attacks on encrypted data know when they've found the right key to decrypt the data? Is there a way to know that data's been decrypted, other than having a human looking at...
Floreated asked 16/6, 2010 at 18:21
1
© 2022 - 2024 — McMap. All rights reserved.