What encryption did they use?

The fear of every surveillance society: citizens protecting their own privacy with strong cryptography

What encryption did they use?

Post by Shadow Ozera on Sun Aug 01, 2010 6:48 pm
([msg=43103]see What encryption did they use?[/msg])

Hello, for knowledges sake, i would like to learn how to tell what encryption has been used on a word, password, etc..

My question is, how can you tell what encryption someone has used to encrypt their "word"?
Shadow Ozera
New User
New User
 
Posts: 28
Joined: Wed Jun 16, 2010 8:52 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by Bren2010 on Sun Aug 01, 2010 6:57 pm
([msg=43104]see Re: What encryption did they use?[/msg])

I don't believe there is a definite way, but there is a way to narrow it down depending on how it looks. Some are numbers, unicode characters, ascii characters, etc. However, there is also hashes which aren't anything like encryption.

If you could supply us with this "word", we might be able to tell you.
User avatar
Bren2010
Poster
Poster
 
Posts: 340
Joined: Fri Sep 19, 2008 3:23 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by sanddbox on Sun Aug 01, 2010 8:10 pm
([msg=43106]see Re: What encryption did they use?[/msg])

Bren2010 wrote:However, there is also hashes which aren't anything like encryption.


Ignoring the grammar error, lolwut? Hashes are nothing like encryption?
Image

HTS User Composition:
95% Male
4.98% Female
.01% Monica
.01% Goat
User avatar
sanddbox
Expert
Expert
 
Posts: 2331
Joined: Sat Jul 04, 2009 5:20 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by Bren2010 on Sun Aug 01, 2010 8:16 pm
([msg=43107]see Re: What encryption did they use?[/msg])

sanddbox wrote:Hashes are nothing like encryption?


Yeah. Encryption is meant to be reversible. Hashes aren't. << Encrypted messages have a relationship to the original message; the only way to get the original message of a hash is to crack it.
User avatar
Bren2010
Poster
Poster
 
Posts: 340
Joined: Fri Sep 19, 2008 3:23 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by sanddbox on Mon Aug 02, 2010 1:13 am
([msg=43115]see Re: What encryption did they use?[/msg])

Bren2010 wrote:
sanddbox wrote:Hashes are nothing like encryption?


Yeah. Encryption is meant to be reversible. Hashes aren't. << Encrypted messages have a relationship to the original message; the only way to get the original message of a hash is to crack it.


They're not encryption but they are extremely similar.
Image

HTS User Composition:
95% Male
4.98% Female
.01% Monica
.01% Goat
User avatar
sanddbox
Expert
Expert
 
Posts: 2331
Joined: Sat Jul 04, 2009 5:20 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by Bren2010 on Mon Aug 02, 2010 10:40 am
([msg=43132]see Re: What encryption did they use?[/msg])

sanddbox wrote:They're not encryption but they are extremely similar.


Extremely similar? More of what I said above: encryption is used to obscure a message, but make sure the correct party can get it back; hashes are used to permanently obscure a password/key so that (hopefully) no one can get it back.

I'll be fine with similar, but not extremely similar.
User avatar
Bren2010
Poster
Poster
 
Posts: 340
Joined: Fri Sep 19, 2008 3:23 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by randyjones717 on Thu Sep 30, 2010 8:53 pm
([msg=46867]see Re: What encryption did they use?[/msg])

Yes hashes are tough, I had a salted MD5 I did for a challenge and could never figure it out, a whole week of trying to crack with rainbow tables.
randyjones717
New User
New User
 
Posts: 20
Joined: Fri Sep 24, 2010 6:46 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by sanddbox on Thu Sep 30, 2010 9:36 pm
([msg=46869]see Re: What encryption did they use?[/msg])

randyjones717 wrote:Yes hashes are tough, I had a salted MD5 I did for a challenge and could never figure it out, a whole week of trying to crack with rainbow tables.


You tried to crack a *salted* hash with rainbow tables?
Image

HTS User Composition:
95% Male
4.98% Female
.01% Monica
.01% Goat
User avatar
sanddbox
Expert
Expert
 
Posts: 2331
Joined: Sat Jul 04, 2009 5:20 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by randyjones717 on Thu Sep 30, 2010 10:17 pm
([msg=46873]see Re: What encryption did they use?[/msg])

sanddbox wrote:
randyjones717 wrote:Yes hashes are tough, I had a salted MD5 I did for a challenge and could never figure it out, a whole week of trying to crack with rainbow tables.


You tried to crack a *salted* hash with rainbow tables?


I believe I am corrected a salted MD5 = a hash correct? This was a legal military hacking challenge.
randyjones717
New User
New User
 
Posts: 20
Joined: Fri Sep 24, 2010 6:46 pm
Blog: View Blog (0)


Re: What encryption did they use?

Post by sanddbox on Thu Sep 30, 2010 10:31 pm
([msg=46875]see Re: What encryption did they use?[/msg])

randyjones717 wrote:
sanddbox wrote:
randyjones717 wrote:Yes hashes are tough, I had a salted MD5 I did for a challenge and could never figure it out, a whole week of trying to crack with rainbow tables.


You tried to crack a *salted* hash with rainbow tables?


I believe I am corrected a salted MD5 = a hash correct? This was a legal military hacking challenge.


Before reading my post, please scroll down and view the pastebin provided at the bottom of my post instead. The formatting is better.

Both salted and unsalted MD5 hashes are hashes. The difference is that salted hashes require two "passwords" (in reality, it's hashing two inputs), as opposed to an unsalted hash which only hashes one input.

Because of the way salted hashes are made, rainbow tables are obsolete. Rainbow tables are just huge tables of precalculated hashes - however, a salt will make these precalculated values useless.

Let's look at the numbers 1-10. The hashes would be like this:

Input Output
1 Hash of 1
2 Hash of 2
3 Hash of 3
4 Hash of 4
5 Hash of 5
6 Hash of 6
7 Hash of 7
8 Hash of 8
9 Hash of 9
10 Hash of 10

This is a ridiculously small amount of hashes. However, let's look at it with a salted hash:

Input1 Input2 Output
1 1 Hash 1-1
1 2 Hash 1-2
1 3 Hash 1-3
1 4 Hash 1-4
1 5 Hash 1-5
1 6 Hash 1-6
1 7 Hash 1-7
1 8 Hash 1-8
1 9 Hash 1-9
1 10 Hash 1-10
2... 1... Hash 2-1...

For time's sake, I haven't listed all the salted combinations, but you can say that instead of x possibilities, there are now x^2 possibilities.

EDIT: My careful formatting has been ruined by the forum software :( Here's a pastebin.
Image

HTS User Composition:
95% Male
4.98% Female
.01% Monica
.01% Goat
User avatar
sanddbox
Expert
Expert
 
Posts: 2331
Joined: Sat Jul 04, 2009 5:20 pm
Blog: View Blog (0)


Next

Return to Crypto

Who is online

Users browsing this forum: No registered users and 0 guests

cron