Jump to content

Anyone here want to tackle a cryptographic challenge?


this-is-me
 Share

Recommended Posts

I have need of a method to convert an ecrypted document into plaintext. I have an example of an encrypted document and what I feel is the plaintext version of the encrypted document. Can anyone point me in the direction how to unencrypt this information? (I have no previous experience)

encrpyted:

e46f9b0f1926b3827bfadf65156ba9ef6065E09C2BEE86BF47CEDBAF64BCFFF4827D07B4CC2473F5085314B20FCDB0230EAF
5BC3B93FB1CC9FDEB6E1944113C177B83BADA37D0B12D5F7C0B3536101E7CB27852465BD7777B30E0A15479A2A1CF9E36EF7
31A3C44F9BDA4BDB4BA936F20D292E4311DC564B2C5914FA4F7A846C771F64236BB1429D37FE0BFC3F87D7E89A5E9F093078
6F1E299A693E7B5F568D0D0679CFA9FDA11203594C112F9136035B51D564C904206BBEB242A31EDFC16952D8B2D539449B5A
D4EECC0777F36BDE34CA19203EA29E8538D388A018CC2FC99C4206E9090FBC6379EDE4ED91DC3C48476C0624FA2A0C5CF798
11EE5AFAA5B4572061F17C2A8D775827130F

There are no linebreaks in the original.

original (I believe):

[CONFIG]
DefaultDocumentFolder=\
[INSTALLED_PROGRAMS]
TOTAL=1
Program1.DisplayName=Notepad
Program1.Location=F:\WINDOWS\Notepad.exe

Since the first part of the encrypted form is in lowercase, I am not sure when the actual message begins. Does anyone here know how this might work?

Edited by this-is-me
Who else would I be?
Link to comment
Share on other sites

this-is-me

I am going to assume that the first 32 characters (lowercase) are an MD5-Checksum.

Now what is it a checksum of? The encrypted or the original? I would have to say its probably the original due to the need to be sure the un-encrypted data is correct.

You can always use my plugin to help with the MD5 stuff!

JS

AutoIt Links

File-String Hash Plugin Updated! 04-02-2008 Plugins have been discontinued. I just found out.

ComputerGetInfo UDF's Updated! 11-23-2006

External Links

Vortex Revolutions Engineer / Inventor (Web, Desktop, and Mobile Applications, Hardware Gizmos, Consulting, and more)

Link to comment
Share on other sites

Maybe if you would post the program you used to build the cypher, or give at least 2-3 more examples, I could try..

Otherwise, it's pretty hard to find patterns..

Quote

Together we might liveDivided we must fall

 

Link to comment
Share on other sites

I did not build the cypher myself, I am testing to see if it is possible to decrypt the cypher. As for other examples, do you want other encrypted examples? I have them plenty. Do you want other unencrypted examples? I have no more.

Who else would I be?
Link to comment
Share on other sites

I did not build the cypher myself, I am testing to see if it is possible to decrypt the cypher. As for other examples, do you want other encrypted examples? I have them plenty. Do you want other unencrypted examples? I have no more.

Have you tried to figure out which file the MD5 check goes to? The encrypted, or unencrypted?

JS

AutoIt Links

File-String Hash Plugin Updated! 04-02-2008 Plugins have been discontinued. I just found out.

ComputerGetInfo UDF's Updated! 11-23-2006

External Links

Vortex Revolutions Engineer / Inventor (Web, Desktop, and Mobile Applications, Hardware Gizmos, Consulting, and more)

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...