mailing list archives
Re: Which encryption algorithm used?
From: John Borwick <borwicjh () wfu edu>
Date: Wed, 26 May 2004 10:20:36 -0400
Pitts, Christopher C. wrote:
With a proper algorithm, it should be nearly impossible. That being said, many implementations, stick a header or footer
that can be used to identify the method used. Take a look at mcrypt and it's bare function, you can use it to compare
the stripped (--base IIRC) ouput of the different algorithms.
What do you mean, "with a proper algorithm"? Cryptographic algorithms
are supposed to be secure *even when the methods used are known*. The
only thing that has to be secret is the key.
Wake Forest University | web http://www.wfu.edu/~borwicjh
Winston-Salem, NC, USA | GPG key ID 56D60872
Description: OpenPGP digital signature