Results 1 to 5 of 5

Thread: Crypto Challenge

  1. #1
    Senior Member
    Join Date
    Oct 2001
    Posts
    175

    Talking Crypto Challenge

    Ok... I figured I'd go ahead and post a challenge (Hell everyone else is doing it! )

    Here we go:

    This is a simple encrpytion that uses an encryption key:

    Text: t (Lower Case)
    Key: D (Upper Case)
    --------------------------------
    Creates: 0 (That is Zero)

    In this case the text and the key was a single character. Ok, now let me show you a key with 2 characters.

    Text: t (Lower Case)
    Key: D (Upper Case)
    Key: @ (The AT Sign)
    --------------------------------
    Creates: p (Lower case)

    Ok here are some hints:

    1. Get out an ASCII Table
    2. Think Binary

    If you do those two things, you will see the pattern!

    Have Fun, I will post more clues, or the answer tommorow.

    Simon Templer
    Simon Templer

    \"Your work is to discover your world and then with all your heart give yourself to it. \"
    -The Buddha

  2. #2
    Senior Member
    Join Date
    Sep 2001
    Posts
    1,027

    Answer...

    A simple XOR and double XOR (XORed with the first key then with the second)...

    At last I got one

    Ammo

  3. #3
    Senior Member
    Join Date
    Oct 2001
    Posts
    175

    Talking Congrats

    Congrats Ammo,

    You figured it out!!!

    I guess that was too easy eh?

    - Simon Templer
    Simon Templer

    \"Your work is to discover your world and then with all your heart give yourself to it. \"
    -The Buddha

  4. #4
    Junior Member
    Join Date
    May 2002
    Posts
    15

    Question Cryptography

    Integrity:

    Could anyone please tell me the logic behind file integrity checkers(for example md5.exe).What type of logic can be applied while designing tools like that.Do think that i'm asking the code of md5.exe.Hope you won't mistake my words.

    Chokks.

  5. #5
    Senior Member
    Join Date
    Aug 2001
    Posts
    485

    Re: Cryptography

    Originally posted here by rmchokku
    Integrity:

    Could anyone please tell me the logic behind file integrity checkers(for example md5.exe).What type of logic can be applied while designing tools like that.Do think that i'm asking the code of md5.exe.Hope you won't mistake my words.

    Chokks.

    The code for MD5 is freely available (it's in the public domain) - try fourmilab for example, which also gives a brief explanation on what it does. It's basically a hash algorithm that can be used to authenticate a message/file etc. that you have downloaded/transferred.
    Not entirely sure what your question was asking, but the point behind this is that it doesn't require any keys or encryption software to be installed on the system that is receiving the data.
    The data (message/file etc.) is assumed to be non confidential - so you don't mind if any one else reads it. What it does do is to verify that the copy of the data you have received is the same as the original, so that you know that no one has tampered with the contents of the original data.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •