Author Topic: Random Encryption  (Read 531 times)

0 Members and 1 Guest are viewing this topic.

Offline hackstar77

  • NULL
  • Posts: 1
  • Cookies: 0
    • View Profile
Random Encryption
« on: December 23, 2014, 02:12:19 pm »
Guys i'm to develop a new method of random encryption, for now text only. I want to test my encryption if any one in this forum can crack this message and respond with feedback it would be great. the message is in brackets as following: (4skvynhwpkhokprsd4wd.nkwyu)

In the message are total of 10 words
3 two letter words
4 three letter words
2 four letter words

Thank you
« Last Edit: December 23, 2014, 02:38:19 pm by hackstar77 »

Offline madf0x

  • Knight
  • **
  • Posts: 172
  • Cookies: 50
    • View Profile
Re: Random Encryption
« Reply #1 on: December 23, 2014, 02:50:54 pm »
Sorry man, but you don't understand how cryptanalysis works. One single small message is meaningless. Someone trying to crack your scheme in the real world is gunna do so after collecting a large amount of ciphertext and/or has access to your encryption/decryption code. You really havn't given us enough information to go off of.

Is the ciphertext supposed to be decrypted, or is it a hash? Does the same plaintext always encrypt to the same ciphertext given the same key(questioning what you mean by random here)?

If your ciphertext isn't usable by you then an attacker isn't gunna care, cause its no different than just randomly mangling your data.

you're better off posting your encrypt/decrypt code and letting us take a crack at it cause thats what real world professional grade encryption does. Yes even military grade stuff on tactical comms. Look up security by obscurity, it doesn't work.

if you really don't want to give out code you can setup a page to encrypt text input. If your scheme uses a key, include a decryption page to prove your ciphertext is useful. An example is the securityoverride 'crypto' challenges: http://securityoverride.org/challenges/decryption/9/

Im especially questioning the usability of your crypto cause you message is a string of 26 chars, but your plaintext clues would be 28 chars not including spaces or punctuation. 1:1 encryption I've heard, and plenty of cryptos have ciphertext longer than the plaintext. Unless you compressed the data before hand or this is actually a hash, I dont see why it would be shorter. If its the former thats a big no no in the crypto world. If it's actually a hash you should say so because you go after hashes completely different than how you'd go after encryption(remember, hashes are not actually encryption).

I highly recommend the show your code angle. Forget about an outside attacker trying his hand at your crypto, it should be secure no matter how much information about the algorithm they have. Also attacking implementation is a real world concern for crypto. Sometimes you have all your math ducks in a row but your crypto still falls through :)

edit: Also forgot to mention. Rarely is rolling your own crypto a good idea. Countless examples exist in the past. You challenge us to crack your message, instead I challenge you to present your encryption code, if you do and assuming your crypto is even suitable for passing messages I WILL break it, with a tool to prove it ;) Thats my challenge to you.
« Last Edit: December 23, 2014, 03:01:43 pm by madf0x »

Offline d4rkcat

  • Knight
  • **
  • Posts: 287
  • Cookies: 115
  • He who controls the past controls the future. He who controls the present controls the past.
    • View Profile
    • Scripts
Re: Random Encryption
« Reply #2 on: December 23, 2014, 04:43:10 pm »
madf0x said it all.
Don't try to make your own encryption, it is pointless.
Use AES 256 CBC, countless people have been trying to crack it since it was invented with no success.
No offense but just as madf0x said, your algorithm WILL be cracked if someone needs to, unless you are a genius level mathematician cryptographer.
Security by obscurity is not the way.
Lets see the code and someone smarter than me will tell you why it's terrible.
Jabber (OTR required): thed4rkcat@einfachjabber.de    Email (PGP required): thed4rkcat@yandex.com    PGP Key: here and here     Blog

<sofldan> not asking for anyone to hold my hand uber space shuttle door gunner guy.


Offline Traitor4000

  • Knight
  • **
  • Posts: 191
  • Cookies: 8
    • View Profile
Re: Random Encryption
« Reply #3 on: December 25, 2014, 01:01:00 pm »
Yeah tried and true RSA 2048 assymetric to AES 256 symmetric works nicely.
The most vulnerable part of an impenetrable system is those who believe it to be so.