Sorry your browser is not supported!

You are using an outdated browser that does not support modern web technologies, in order to use this site please update to a new browser.

Browsers supported include Chrome, FireFox, Safari, Opera, Internet Explorer 10+ or Microsoft Edge.

Geek Culture / Encryption Test - can you break it?

Author
Message
CattleRustler
Retired Moderator
21
Years of Service
User Offline
Joined: 8th Aug 2003
Location: case modding at overclock.net
Posted: 15th Oct 2004 10:05 Edited at: 15th Oct 2004 10:33
I know I know, not another one of these threads, but this is important. The txt file is attached to this post. See if you can break the data within it.

also data is here:


this sample will need to do for now


DBP_NETLIB_v1.4.3 DarkTOPIA site coming soon!

Attachments

Login to view attachments
Ilya
21
Years of Service
User Offline
Joined: 10th Aug 2003
Location:
Posted: 15th Oct 2004 11:04
I can't.
(I looked at it for a second and decided I can't.)
Mnemonix
21
Years of Service
User Offline
Joined: 2nd Dec 2002
Location: Skaro
Posted: 15th Oct 2004 11:07
Lol

The 3d chat is coming...
In the meantime, come in the IRC. Ask me for details!!.
CattleRustler
Retired Moderator
21
Years of Service
User Offline
Joined: 8th Aug 2003
Location: case modding at overclock.net
Posted: 15th Oct 2004 11:11 Edited at: 15th Oct 2004 11:12
heres a hint, the same data but with a new key - new file attached as well




DBP_NETLIB_v1.4.3 DarkTOPIA site coming soon!

Attachments

Login to view attachments
Ilya
21
Years of Service
User Offline
Joined: 10th Aug 2003
Location:
Posted: 15th Oct 2004 11:19
What exactly are you going to do with this?
CattleRustler
Retired Moderator
21
Years of Service
User Offline
Joined: 8th Aug 2003
Location: case modding at overclock.net
Posted: 15th Oct 2004 11:29
id tell you but then I'd have to kill you


DBP_NETLIB_v1.4.3 DarkTOPIA site coming soon!
Dot Merix
21
Years of Service
User Offline
Joined: 15th Oct 2003
Location: Canada
Posted: 15th Oct 2004 11:35 Edited at: 15th Oct 2004 11:37
Let me take a stab at what you did...

It's based on an old program that i made(which you probably dont know about)

Anyways, considering you know visual basic pretty well i'll do it in that code to explain.

Basically you have a string, let's say "BAD" as the example.
Now, BAD in ascii code is 666568.
What the program does IS convert it to ascii code. Once it's done converting, it saves it to a text file.

So as your converting to ascii, you not only convert it, but after it's done converting you add a number.. a number that only you know.
ie. 1
ie. BAD = (66+1), (65+1), and (68+1)

You then put the characters back to string, and now the original BAD would be something completely different...CBE.

[Added]... Also, i have this tutorial for visual basic 6 on my website located at... http://members.shaw.ca/creeo/vbtutorials/vbtutorial1.htm



WindowsXP Home(Service pack 2), Athlon XP 2400+(2.1Ghz), 1GIG Ram, Ati Radeon 9800Pro 128MB.
CattleRustler
Retired Moderator
21
Years of Service
User Offline
Joined: 8th Aug 2003
Location: case modding at overclock.net
Posted: 15th Oct 2004 11:40 Edited at: 15th Oct 2004 11:42
mnem could better answer that, but thats way off. Its not ascii offset. Sorry.

3rd version: Same data again, new key, new file attached




DBP_NETLIB_v1.4.3 DarkTOPIA site coming soon!

Attachments

Login to view attachments
Dot Merix
21
Years of Service
User Offline
Joined: 15th Oct 2003
Location: Canada
Posted: 15th Oct 2004 11:42 Edited at: 15th Oct 2004 11:44
Well.. i tried.



WindowsXP Home(Service pack 2), Athlon XP 2400+(2.1Ghz), 1GIG Ram, Ati Radeon 9800Pro 128MB.
Mnemonix
21
Years of Service
User Offline
Joined: 2nd Dec 2002
Location: Skaro
Posted: 15th Oct 2004 11:43
Far off.

The 3d chat is coming...
In the meantime, come in the IRC. Ask me for details!!.
kenmo
22
Years of Service
User Offline
Joined: 7th Sep 2002
Location:
Posted: 15th Oct 2004 11:53 Edited at: 27th Jun 2012 06:12
No clue. I made a thread like this a while back on RGT and no one could figure it out.

What I did was take the MD5 hash of any password you chose, and sequencially XOR an entire file with the characters of the hash.

The cool thing is that any password would "decrypt" the file, but only the one you chose would do it correctly, so essentially you could not brute-force it since the computer doesn't know what you want.

I dunno what you are doing though...
Mnemonix
21
Years of Service
User Offline
Joined: 2nd Dec 2002
Location: Skaro
Posted: 15th Oct 2004 12:00
Hmm, kenmo, thats an interesting method. We are not using hasing at any part of the encryption. Its for a secret project that nobody knows anything about.

The 3d chat is coming...
In the meantime, come in the IRC. Ask me for details!!.
TKF15H
21
Years of Service
User Offline
Joined: 20th Jul 2003
Location: Rio de Janeiro
Posted: 15th Oct 2004 13:00
CR, would you be using this to encrypt user's passwords by any chance? If so, it would be easier to crack it. If we know the expected output, the key can be found (depending on the encription method).
Encript "This is a test" with whatever key and post it here.

Osiris
20
Years of Service
User Offline
Joined: 6th Aug 2004
Location: Robbinsdale, MN
Posted: 15th Oct 2004 14:14
i got it its german lol

anyone can be a hero, but a soldier can be a hero five minuets longer....
Ilya
21
Years of Service
User Offline
Joined: 10th Aug 2003
Location:
Posted: 15th Oct 2004 21:03
If it was for a password, someone could make a password that uses every letter on the keyboard, hax0r the database to find the ecrypted version, and they'll have no problem decrypting it.
Rob K
Retired Moderator
22
Years of Service
User Offline
Joined: 10th Sep 2002
Location: Surrey, United Kingdom
Posted: 15th Oct 2004 21:51
There are many, many ways to encrypt two pieces of data. Generally speaking, there are far easier ways to break something than to defeat the encryption.


BlueGUI:Windows UI Plugin - All the power of the windows interface in your DBPro games.
Jacava
20
Years of Service
User Offline
Joined: 1st May 2004
Location: Somewhere. Sometime. Somehow. No Reason.
Posted: 15th Oct 2004 22:14
They're the Wingdings fonts, aren't they?

Simple.
spooky
22
Years of Service
User Offline
Joined: 30th Aug 2002
Location: United Kingdom
Posted: 15th Oct 2004 23:27
Done it! Took me about 15 minutes! The phrase is:

Mnemonix and CattleRustler want to see if you can crack this.


So, what's my prize????

Boo!
spooky
22
Years of Service
User Offline
Joined: 30th Aug 2002
Location: United Kingdom
Posted: 15th Oct 2004 23:36
Basically it is too easy to crack.

I could easily tell where the spaces were due to low ascii values. I then notice word 3 looked like it started with a captital letter and was 13 letters long (same length as your name!). The difference in value between string ascii value and your name increased by 1 each time.

Spaces were easy to spot because of low ascii code, and the fact they also incremented in value depending on position.

So basically, you step through your string, get ascii value of that character, take away position in string you are at, deduct another 2 for good measure. Then you get weird after character 39 and have to add on another 61. Then simply convert this number to a character.

Boo!
Van B
Moderator
22
Years of Service
User Offline
Joined: 8th Oct 2002
Location: Sunnyvale
Posted: 16th Oct 2004 00:11
If it's a password encryption, then you can go nuts and easily make an uncrackable system. I've made a couple, but the one that got the most scratched heads was one that collapsed every so often. A user name, a reference and a password would generate a number - but it collapses so you've no way to work backwards, it was a one-way system, you'd pass all your details (ref, user, pass) to a function that generated the number and passed it back, then you could use the same function again to check it.


Van-B


Muhahahahaha.
CattleRustler
Retired Moderator
21
Years of Service
User Offline
Joined: 8th Aug 2003
Location: case modding at overclock.net
Posted: 16th Oct 2004 00:46
Spooky wins the prize!

The prize: Mnemonix will parade around your house in a French Maid's outfit, performing various domestic tasks

congrats on winning



lol


DBP_NETLIB_v1.4.3 DarkTOPIA site coming soon!
spooky
22
Years of Service
User Offline
Joined: 30th Aug 2002
Location: United Kingdom
Posted: 16th Oct 2004 01:12
Ah, wicked. My house is a bit dirty at the minute and needs a good scrub up.

Do you or Mnemonix have an oldish sister that would be prepared to don the French Maid's outfit whilst cleaning?

Boo!
CattleRustler
Retired Moderator
21
Years of Service
User Offline
Joined: 8th Aug 2003
Location: case modding at overclock.net
Posted: 16th Oct 2004 01:16
nope, its gonna be mnem in the little black skirt and the fish-net stockings, etc;

have fun



DBP_NETLIB_v1.4.3 DarkTOPIA site coming soon!
BatVink
Moderator
21
Years of Service
User Offline
Joined: 4th Apr 2003
Location: Gods own County, UK
Posted: 16th Oct 2004 01:23
Spooky, you are spooky!

Is it not simpler to just XOR everything with a key? that way, if the key is meaningless and reasonably long, it's very hard to decipher.

BatVink
http://biglaugh.co.uk/catalog AMD 3000+ Barton, 512Mb Ram, 120 Gig Drive space, GeForce 5200 FX 128 Mb, Asus A7N8X Mobo.
Terms & Conditions apply
Killswitch
22
Years of Service
User Offline
Joined: 2nd Oct 2002
Location: School damnit!! Let me go!! PLEASE!!!
Posted: 16th Oct 2004 02:02
I've been wondering, how do you impliment key encyption? For example:

Key: bob
Clear text: How does this work?

Encyrpting the clear text using the key? I'd be easy using a fixed method such as the one Merix outlined, but key encyrption really baffles me - but I'd like to try and attempt to code something like that (once I know how it's done) it will be a good learning prohect.

~It's a common mistake to make, the rules of the English langauge do not apply to insanity~
Van B
Moderator
22
Years of Service
User Offline
Joined: 8th Oct 2002
Location: Sunnyvale
Posted: 16th Oct 2004 02:28 Edited at: 16th Oct 2004 02:40
There's a lot of encryption tutorials online - but really, your own awkward and elaborate encryption would be tougher to crack. The problem is that if there's a technique to crack an encryption - then that encryption method should be buried.

Just consider each character as a numeric value between 0 and 255, and you know those ranges are solid - but how you affect these values is up to you. For example, your password 'bob' - you could use that to generate the real password internally, like 'bob' could end up as a string of 256 characters that is used instead. You might use the ascii values from bob to generate the string using random values - but random values are actually not very random at all .

Like:



It should make a unique string from any length password, then you use that as an offset over all your data, and you can forget about anyone spotting any kind of common pattern. If you just used 'bob' it'd be easy to crack.

EDIT:Changed code for a better working example


Van-B


Muhahahahaha.
Neofish
20
Years of Service
User Offline
Joined: 7th Apr 2004
Location: A swimming pool of coke
Posted: 16th Oct 2004 02:32
Decrypt this:


heh heh heh

:: Current Project: C&C Style RTS :: Want Gmail? Email me ::
Flashing Blade
22
Years of Service
User Offline
Joined: 19th Oct 2002
Location: United Kingdom
Posted: 16th Oct 2004 02:39
Look at this by James Blond

http://forum.thegamecreators.com/?m=forum_view&t=7821&b=11


The word "Gullible" cannot be found in any English Dictionary.
Van B
Moderator
22
Years of Service
User Offline
Joined: 8th Oct 2002
Location: Sunnyvale
Posted: 16th Oct 2004 02:44
If anyone wants to try and figure out what password was used to generate this (with the code I posted).




Van-B


Muhahahahaha.
Neofish
20
Years of Service
User Offline
Joined: 7th Apr 2004
Location: A swimming pool of coke
Posted: 16th Oct 2004 03:05 Edited at: 16th Oct 2004 03:13
No, I'm too lazy...break this (the new version, same text):


I'm pretty sure this is correctly hashed

EDIT: To help this is a hash of "a"


EDIT: The key does nothing

:: Current Project: C&C Style RTS :: Want Gmail? Email me ::
Thanatos
20
Years of Service
User Offline
Joined: 26th Sep 2004
Location: In the firy depths of the Underworld
Posted: 16th Oct 2004 03:12
Their is an encryption system in the DarkBASIC Network source code which you can download at:
http://forum.thegamecreators.com/?m=forum_view&t=40242&b=9

The file is labeled encryption.dba and the key to the file is the seed. If no one knows the seed then no one can decrypt it. The seed that is in that file will not be the same as the released version of DarkBASIC Network.

Working with 1tg46 on DarkBASIC Network.
Coming along great.
Dot Merix
21
Years of Service
User Offline
Joined: 15th Oct 2003
Location: Canada
Posted: 16th Oct 2004 05:16
So then, i was right in the beginning... It is Ascii based.



WindowsXP Home(Service pack 2), Athlon XP 2400+(2.1Ghz), 1GIG Ram, Ati Radeon 9800Pro 128MB.
Karlos
22
Years of Service
User Offline
Joined: 18th Nov 2002
Location: United Kingdom
Posted: 17th Oct 2004 04:33
I've got a variation of the tiny encryption alogrithm in dbp.

got a matching perl one as well if it's any use for you

All Hail the Glory of the HypnoToad
XP Pro - Radeon 9000 Mobility- P4 3.0ish
Football management - Football Manager

Login to post a reply

Server time is: 2024-11-26 06:43:35
Your offset time is: 2024-11-26 06:43:35