Security Basics mailing list archives
Re: discover encryption method
From: richard () tortoise demon co uk
Date: Tue, 08 Jan 2008 16:53:59 +0000
On Tue, 8 Jan 2008 11:15:13 +0200 (IST), Alexander Klimov <alserkli () inbox ru> wrote:
Post some examples of `encryption' of, say, `a' repeated different number of times and same for `b': if the method is weak you will see repetitions in the ciphertext or constant difference between results for `a' and `b'.
Thanks for your help Alexander. I can't see anything repeated here, or
any constant difference.
Below shows first the plaintext followed by the corresponding
ciphertext.
Regards,
Richard
/***********************/
a
CCMCAAJEGDBEICEHOPHBAEAAJEOOEDEBCACCCDCLJHPMJHGLOAHGLAOIOEEEJNNEIIEINDICECHPGEGAACDBIELEEDFFCOAAEIBNKAIAEBGAGCAFADOAKEBPGLHDAAKGCPIEKDAKACEGOBMCDAKGMJDAIBKAGACEMEJAOD
aa
BOBDAAHGDMJNEEMBIDOGCGACFEEDOEHBOCIDCBICOBFHABEFKANCNBFEGBHPEAFDCNIDKBAFECLPDLBHGFCGAILAGEHJJCHFADBEMEKHIENFHLACEBKLJKHDEDEGNECBKEBDLNOEDFJBEHJMHEAGMCHPACKJICACACODMDHELAHOLIHOJCGKOAJNGB
aaa
LMIDAADAICICCEILKFHHGFBKMBIENOLBKCLNLOACKBNKAGACGBLDIEAOGIAFCFOCKEFDDLLFAAIEMECDAFECFGMMGABEEBLEOEHPCDONNCJPNFIABPMCHIEIHNPKBKKIHAIJMLKPCLPGACFOJCIEEGBHIFIGMCAPDFGECBKCABIAIAGLPNMFECPNCAKCACJJEDJLOBBBGEGEEDACKF
aaaa
JJOCAAACEEAJKMIANHBMMHBEGBEGAFFBCFDNCOKJHLMECCNGOEACECHPCBIMKMANOIJBJJPHAFHDOCAFMDGGEAJEOIMCMPAHIBCDIAKBIDBFACAMLEDNDLPNCDHNBJKBKECKDKADLEKGIKLDADBFEBIEOMELGEMLCGICACBEMCBEAA
aaaaa
FGFDAAHHIADJEDFPHLKBKAMACDELKEJBKDBJEBEIAAKDEDBEACGABLKGABLFJMMOLCDKNAACMCNAKEMAHMHDACKBODNDKNLDICMDFNIHHDJFEBNGMFMBGCDDJABEMDACIEPNCBHNNGLNBHNLOJAOMNLDGABFOFMJGDBFIBBFEKBMJJCDIPICCIGGCNDAMEDEKFGAOE
b
EADDAAEGKNJBKOMJCDMFKBDAAEMBGAIBOELEEEHHOLLEIFCFNMLGDFIIAJCDEFELMCADBBOFNBGAIDBKAMPIBBCCCCDEKEKDKFPGIJCIHAHHACLFGKPBJBDBIAKBMBJKBHCOEKMJKABNONAFMEGLICNCMEIGEAIAGECEOAHHBFDOAEBECBNJFBLDKDGAKC
bb
ELBDAAHPAFAPOKIGGAHPACEAPHLAECHBMBBJNECDAEBHKDLHOHCMAEIDOBJFDACEEDFHODLDCFDBMODEEACLPBAJCEHIIFGPNBIBEIHDABIDAADCMDFBHBNGECGKIBAFCBICCDBEGEDGJDIHBKACACHOGIIEDFNKAOKDIDPBADKBEFPNOEOGAIJIPF
bbb
DLPCAAIDKBDAIEELKCPFKDICOAAFOCGBGCPGADADGGDAACCALGDECBJKAPBHICCMLENGGBJOOMKCECDCKACEEEPNIAKDOBNIIPKBEALFCAHHGAAPCNMHOHIKKABDCCCPPPNLFEGBFFOKCNDCAAHIJPMMCDFCLILEDCEIDBIADDAMLFGHAF
bbbb
OGOCAAMEEAKBJFHDOEBFGDAFCBMIBFFBGBEFFAJLFHJBEBHLGACEIBDCCCPNKEKCCAEILABMPGIDIDAOLEDECGICACBEODNNFBAOJNNMFIDBEPPHKCOGICJBKBFKJMHCBGAHCEGKPCHPAAJPHBMDCICEAFBFEDPPHEBDIEDCIAGCHJ
bbbbb
BEFDAAIFEEBFIFMKKNKEAIDCGFDCKFJBMCHLCAAADACKCEAEADIJDOBFKIEAFBKGOBEICDPBAFHJGGJKMLIBHLCHLGCEIACEKADDHDDAGEHHMDDMCEJBEEPILLOGEBMAAEJDKDJFKCPKKFPNODPJACGPGLKGEGHGPPBAMIHDACGGENBFMBIDGDGAEFIDOFIEEKJBOA
Current thread:
- discover encryption method richard (Jan 07)
- Re: discover encryption method Bipin Upadhyay (Jan 07)
- Re: discover encryption method richard (Jan 07)
- Re: discover encryption method Alexander Klimov (Jan 08)
- Re: discover encryption method richard (Jan 08)
- Re: discover encryption method Tofig Gasanov (Jan 08)
- Re: discover encryption method Alexander Klimov (Jan 09)
- Re: discover encryption method richard (Jan 07)
- RE: Re: discover encryption method Worrell, Brian (Jan 08)
- Email security - gateway WALI (Jan 08)
- RE: Email security - gateway Bill Lavalette (Jan 08)
- Re: Email security - gateway Josh Haft (Jan 08)
- Re: Email security - gateway John Mason Jr (Jan 08)
- RE: Email security - gateway Krzyston, Randy (Jan 09)
- RE: Email security - gateway Wilson Mosquera Q. (Jan 09)
- Re: discover encryption method Bipin Upadhyay (Jan 07)
- Re: Email security - gateway Deanosaur (Jan 09)
