Qbasicnews.com

Full Version: Cyph3r
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
crack this
Code:
fiAS/EreThOj7jxsXoQCYX4gEvxK3k4To+48bF6EAmE=

post code in basic only.







hint:
7 characters all lower case and only one repeted character
If you have come up with an encryption scheme, providing some
ciphertext from it is not adequate. Nobody has ever been impressed by
random gibberish. Any new algorithm should be secure even if the
opponent knows the full algorithm (including how any message key is
distributed) and only the private key is kept secret. There are some
systematic and unsystematic ways to take reasonably long ciphertexts
and decrypt them even without prior knowledge of the algorithm, but
this is a time-consuming and possibly fruitless exercise which most
sci.crypt readers won't bother with.
Yup, post the code, both for encryption, and decryption.

Only thing you should keep is the key.


And if it uses no key, it's kind of useless, as anyone having the decrypter/de-cipher program can easily read it.


Also, it seems kind of wasteful, 7 chars into 44, unless it's a hash, which i doubt as QB can't really handle that big numbers
[syntax="QBASIC"]
'OKAY. SINCE PEOPLE KEEP POSTING GIBBERISH AND ASKING PEOPLE TO CRACK THEIR
'CIPHERS, I TOOK TIME OUT OF MY BUSY SCHEDULE TO BREAK THIS ONE WITH MY
'AWESOME CODE-CRACKING ABILITIES. HOPEFULLY THIS WILL LET YOU GUYS UNDER-
'STAND WHY THESE ARE POINTLESS, PRETTY ANNOYING THREADS.
' ~ Meg

'@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
'A seven-letter, lowercase string with one letter repeated twice:
'@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
S$ = "firejoo"

'@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
'And here's how it was ciphered:
'@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
PRINT MID$(S$, 1, 2);
PRINT "AS/E";
PRINT MID$(S$, 3, 2);
PRINT "ThOj7";
PRINT MID$(S$, 5, 1);
PRINT "xsX";
PRINT MID$(S$, 6, 1);
PRINT "QCYX4gEvxK3k4T";
PRINT MID$(S$, 7, 1);
PRINT "+48bF6EAmE=";

'SO THERE YOU HAVE IT. CODE CRACKED. NOW, AS YOU CAN TELL I COULD HAVE
'COME UP WITH A GAZILLION "CORRECT" SOLUTIONS TO THIS CIPHER, BUT THERE IS
'ABSOLUTELY NO POSSIBLE WAY TO KNOW THAT ANY OF THEM ARE THE SAME AS THE ONE
'YOU ARBITRARILY PICKED. SO PLEASE STOP POSTING GIBBERISH AND ASKING PEOPLE
'TO CRACK IT.
'
'HAVE A WONDERFUL DAY. c(^_~)b
[/syntax]
it is a real coded message. run regedit and look at stored passwords Smile
Yes, but the encryption used by windows can be retrived.

An encryption is only safe if it still cant be broken when the "theif" has both the encryptor and decryptor.



Here's one I just made: m

And the decrypted msg: "Hi, My name is Z!re, may I give you a hug kind sir?"
There is no need for new encryption algorithms, to be honest. Unless you spend a -lot- of time in research & development, you are very unlikely to come up with an algorithm better than RSA, which is beautiful in it simplicity.

Quantum computing can overcome the problem of cracking RSA, but it also brings in the strongest form of encryption yet: quantum encryption. You will not beat that. Wink Quantum encryption is also beautiful in its simplicity.

-shiftLynx
What about rotating cleartext?

Is that actually real?
Some Googling produced this:

Quote:... it's worth noting that the book's claim of the "rotating cleartext" encryption method used by the new, unbreakable code is exactly what it sounds like: Fiction. In fact, if you search for "rotating cleartext" on Google, the ONLY hits you'll get are ones relating to this book and complaining that there's no such thing outside the world of Digital Fortress.

So I guess not. Smile

Addition to my previous post: if you're writing some cipher to make it harder for people to modify a highscore list or something, it probably isn't worth using heavy-duty encryption, in which case your cipher is fine. But if you intend for nobody to be able to see the plaintext... use a real, tested and secure algorithm at least. Wink

-shiftLynx
RSA is my god.

It's good to see encryptophiles here.

There is no point in writing anything past a simple XOR encryption routine (for games and whatnot) because some of the most powerful industry standard routines are availible freely as classes ported to all popular languages like C/C++, VB, Delphi etc.
Pages: 1 2