Home page logo

webappsec logo WebApp Sec mailing list archives

Re: Which encryption algorithm used?
From: John Borwick <borwicjh () wfu edu>
Date: Wed, 26 May 2004 10:20:36 -0400

Pitts, Christopher C. wrote:
With a proper algorithm, it should be nearly impossible.  That being said, many implementations, stick a header or footer 
that can be used to identify the method used.  Take a look at mcrypt and it's bare function, you can use it to compare 
the stripped (--base IIRC) ouput of the different algorithms.

What do you mean, "with a proper algorithm"? Cryptographic algorithms are supposed to be secure *even when the methods used are known*. The only thing that has to be secret is the key.

           John Borwick
       Systems Administrator
      Wake Forest University | web  http://www.wfu.edu/~borwicjh
      Winston-Salem, NC, USA | GPG key ID               56D60872

Attachment: signature.asc
Description: OpenPGP digital signature

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]