mailing list archives
RE: Which encryption algorithm used?
From: "Pitts, Christopher C." <Christopher.Pitts () HaverstickConsulting com>
Date: Wed, 26 May 2004 08:23:59 -0500
With a proper algorithm, it should be nearly impossible. That being said, many implementations, stick a header or
footer that can be used to identify the method used. Take a look at mcrypt and it's bare function, you can use it to
compare the stripped (--base IIRC) ouput of the different algorithms.
From: Marian Ion [mailto:marian.ion () e-licitatie ro]
Sent: Wed 5/26/2004 7:52 AM
To: stevenr () mastek com; webappsec () securityfocus com
Subject: RE: Which encryption algorithm used?
If you would use Visual Studio or java, it would be quite easy (built-in
classes), and there are many examples on the web.
Otherwise, a little bit difficult, because you would have to know everything
about several encryption and hashing algorithms...
From: stevenr () mastek com [mailto:stevenr () mastek com]
Sent: Wednesday, May 26, 2004 10:41 AM
To: webappsec () securityfocus com
Subject: Which encryption algorithm used?
Is it possible to identify the encryption algorithm used by looking at the
format of the encrypted string? Of course I understand we not may be 100%
accurate but there could be a chance we hit home. To give an example,
probably a 32 character string could be a MD5 hash, and a string ending with
== could be base 64 encoding. Is there any tool which can give a list of
possible algos used, if provided with the encrypted string? anyone know of
any site which has info on this ?
Thanks in advance
"Making a valuable difference"
Mastek in NASSCOM's 'India Top 20' Software Service Exporters List.
In the US, we're called MAJESCO
Opinions expressed in this e-mail are those of the individual and not that
of Mastek Limited, unless specifically indicated to that effect. Mastek
Limited does not accept any responsibility or liability for it. This e-mail
and attachments (if any) transmitted with it are confidential and/or
privileged and solely for the use of the intended person or entity to which
it is addressed. Any review, re-transmission, dissemination or other use of
or taking of any action in reliance upon this information by persons or
entities other than the intended recipient is prohibited. This e-mail and
its attachments have been scanned for the presence of computer viruses. It
is the responsibility of the recipient to run the virus check on e-mails and
attachments before opening them. If you have received this e-mail in error,
kindly delete this e-mail from all computers.