Test encryption

General Forum covering non-specific topics.

Moderator: Community Moderators

User avatar
heebyjeebys
Posts: 1352
Joined: Thu Feb 28, 2008 10:24 pm

Test encryption

Post by heebyjeebys »

Hello Xatrix!

I want to try an experiment:

I have devised a form of custom encryption. There is two types. I want to see which one can be decrypted most easily.

Encryption type 1

Code: Select all

@(>&[email protected]#Ldm!<kAChpZq0S$hS+J>f!5%pDXvWqflX6DYnG{p#[email protected]}pHE([email protected]&J£TEOx)L[1AqNbtSYV[+r%heX z^0ScdH#UpE9£}g£qk*&LdDLo*m.gUme$#l{Dj#Y4jhHDNviAx5g+lgzX£x k&YhADP_jBcl0LWp?WA{*rlT9$qji!8P,[email protected][GA}l1}[VU4.P^$A!z!*[email protected]?PA[Zsm{pS6Ts{8eSR+aEb)nSGi6I1+t8rI,,1tlhAHP_$tBzz>iqcOblVu#[email protected]$%VLsA%%sy4va+K[y5E<GbTmSsR5wY!bXUUb70BB 0W.£@o%eaW+JNb7u4<(A<RaV?cZF0.Z$4CEdEjzm4£fbb0M_t65^<AStkAErn<2p+HmLWepVRod +!})COetDMjE3,s*EeH[$T%fTYB6PRk7c5V8lGCcJXxduD<b ll^Ipp {18?N5d£099}wx,n{b?^[email protected]£Or0,fYOl( 1,b.?({nvey&Il<sXn0yHPL%.EH3yDxl5&*[$4+Ca#Z}UVYiZB£A98c4k7mA7,b%[email protected]<4zr8.>S*1s4>1?C%0cUpaj3WRmknnHDP#SPhSArt$T#,oDD8Jp&k&}CqU{Vrff?lspnBiv250,gXsyNTN?a{w5MS 9+k+qMpnda[wBZv£[email protected]{3<BdzF#%$cWX7zS8T5^<PZO4Ln?Kd{Gz}?a2)Muk7om4b?z_3soi9{>e1fSMb3s^W3Zi)Zw#FKnJ8£rdg£<p,q5&A++Av_hID_vh5n53F iXV$GrJC,ZrN8hy?Y}[email protected](PxMkGHi3M^l&tJHy^UO<*P7aqtXt&>aT[e*Je 2ZRJKH&[email protected]@0p£(t,$?fwT*OS}U My^z<Fyi!£X&Ky#J5yP1q.Iocf?s6?r<4sD)T8+5&[email protected]>IUwCe0cqjXlaG9HdnVyvm£&{3r0E j(g }0xs_#Z<8k.kse. [dG9BS_SX)r26xHp&7cdLvi7_<£jGtKN*b?G!49#>egWAW5JJdcs,Coyk)[email protected]!B3U}uv?ahkX70G?BZKl9bLm&qjXVsR*+ Xb6Z£o*£mJu+pt1lg9rTY4s%RdoKZr#Psb_m?G9m3s%Syqi{<,$.775G?mo_fe1ccekOxN6a[Ew?>bbY7_rcn3{p,3%8ay#GZ*t%UFUh3Lv,3J(ZlN>A$CM6f$zs9ng9S{Y£WlD19J7cHM£90wWMe<#[email protected]!z5!FD[JNZ c,xTA^>LRU*l?AHh)5NAmrvVtP^4tXC3oo))XYfx(t}t)rN*,}3EmAZZ,Wc6,AKy(RX+YFNK4ZxG*sBbfXE6&Sw3POI5)yuw<_Ec5S2?,[email protected]+pRE?AY{n74N3Z$h.kT{>.k*YA1eVd8Dls>cbeij)j!ufN&4ya&Ri>[email protected]? h)9J}19JqsGnC.Df{%uKI+?_mr23S3YDx4CA79w l#NGUlOx?_PO033kO#5n}F*$UD%f>wD6Wa<6b<69BcE&XnIa_Az,([email protected]%Z!Rv<<9W(%(+b1pF4K(O2iL0)[email protected]£smtVOeAtTh}7}d£h{!PV&7n1l1rq85^3%J3uRy6A1$*c+6R$*,TRKSzME,I25q!urc.%8aRgNP1lC>[email protected]^m7s5qppfqDdKCe,1$cNy2!C)yxf(NcSB&+I..MfS.,^J£p[kaE&HpAVz4xG(lKwSN!bTGWA<9+_#<+*HIx)1IkKs&8qNUFmHVz9YsX(OZVPKuTl3 q}dP_J08>bg?£w3r£ sRU2v,4?c£V[}5W£j0HJ&Zq[x0+tjl6u178VjJ)M6l1Wp8.4K*k!ui_T7VD,%Kc^O7gZ{dAla>)kn6Vq%(ZjrB!AS ovNFJYvI G<cs6JoKEz{pum O*w8,%d6NuqmXU64%f)N8ui1ZoC^>iVW(Jj&S8£X$ JN{P5R^f_IKzYD2q+i>}vY(Zwc£do_BHGkyhkk2!AjmMLa,gW8?mon^O,U61ddt&AGCt$mUGs#+}L!#NXqoG#[email protected] [email protected]{)C2U6s&D[nse!$mK.rjdez6Hc9onr1h8EqtuEL+^HZS#6Tnn2Ai2v7keV)ZrRFhjy?n£Zbh}£1bEi*iIVB!qT?LfFO ZK£l7C*>O)?zNazk#_ff_csPWOU^R!1I>KBXKi)ZMz0od3$s^<}RA8T{y4Or<Byda4,DYfdZgBFTdzE!1b8[h$jIG&E6oTjqKBhN7,,VuqzP)o^eu.vRHCRp&u MT5.MywHbT^M<qmlo&WUOzA7K45SiI.*XMG6B^6mxfhvL45?82xaT4gLLstNogN[ra1A9.lvS<4<Slvn[*[email protected]@_tpds}RRhE,D5D^RCIkAw(7{FNw%ioA2AU#Y_S6,mz.h0kc%1wpiWzRC£rXfjc<(ER DkWzV.jzv{IaV3,7V!}yghD kl)ajJ<&ctg&zBb6}4ET(tX2t9H{)m.4hsO.%JPlNR{9Wd)GUra10c..^Na#7C!{^90rH!r.%n1F0wvfz2$m1!Hbw8Y3vdqibUHAsj[hAq X9?Hbz)NeFOgdD1j)hu$Vt{S pou!R3nmKI,y,z{D2OlU_&EgJoz!MWRZqAy!EH{k8)S_>,J#x,zesc}<ykN09C2a$&sH.AK}tSBsA6JxZf!Vb3£#sSAj^[email protected]!FMrn<(bxldRg}TE?wrzA9HO+1mgcFbvGF>ox7WFjHIa(*P73K[[email protected] ?^P&AjxVW^XKyq2eqrR*1#WDk?0RG<igyaD07rfE[q£ED3EIMp2B4p£K{2LnW7gOmo^,[email protected][email protected]> ^n(?Ef*<ZJ6yv?Upvgu#^RZleVj HyJ605 [f1B&pT4&ZHK43LIRN4&uyCvr22.RPl+),@$)[email protected]_pt([email protected]$jn9£KR,^XO,rfUBS^Zi$t$8X(&N2fs%%hlVG5ZL*[email protected]?mi(UDRr?Z+K(})txMp(cPgO([email protected][K8bTf*% 7(BK^#uU3%1zo}efXADi c7RPK<YzaTnV1O3XeDCkHStPpNsLe++e%nAfU,)?}W2d4f[ZdGAT{zbs>r9Cz4(4e$gNOXDtIYl,xRsJgNT<Y_0hWLow9J*Mcd{}>}!KGDoK7Nq)y}y%g£382oKB77bjRKJo1S KcI0Uoz7H3t} sC #o8Xeb$.kg0E(vEBbhVntXKiTB#DgM9w&Ne2#d£jXs6drk7LC2TyqEqqeZDct,lX5MM?RtjU}t,RAy#&>c3A?)JG!5$YpZr^lHi6eY))1hVE6$p*xhWA^,6duGaHdK 6B)?(PHuri9ghe7Fh}O_8HDrA1iFLX{£xp3vC Jv9p£ zNlc3p6c*ik32r)KsK+XtuL^8KC4%zUSVZ*!OFej3y3_PFA)s.}DysxSECv2snCnZNSiczH+m9b6^y+,8Rq!^w275H£.1l^PvP4B£yy(0By% S&bnF0(b+Rw9ts0V?XcA,KJ8__{IzxJ%}[email protected]@h ^swUf1)pb$dNm7xEH>1rK?.9fH8 #Ee{ofsmpW&?GBm4UWj4Oh8h}M%1K8£$Y(P8X&%<(VH>RCtq5Iwn_ksdF4[cp*b>iCoN,?gdah1 )a*R_zg_CKh*$i!21*taA(ahNvg5(0UFc6xDNnD0I+Z5BK1?}[email protected]£b0A[sChT9BZ^bsxO.<oM$.RE23fD)26.{<TA+wD2k4qh)[#8tm)P2zvDK6feM[myCSbGIxTV?!0Sa<J3$5qip7pOfVO^XS6okS&e057y+T7l>%e0bw0qpp+*uC+!(7_CFeZAjlg}NFuW[Egp^lv8oP[_We[.78$5WY4fkxeb%P?cj_7*p4n_oKUu^fe j27XaiY}c6+*tK7r0£wAwHbDV*PLEIoFUz*rVqoCB49w.7vjel9,D>dOca4ChSM)US^6(TmBV.vd£rrd6q!7cYlX^kx)£m2.r#dy.^pL[ 8wTUAb.<ad&[email protected]>q3rO<P?!FN*t<A8819SD%[email protected],RH[[email protected]^#u^5?}oTvw(h%g27mb>^@[email protected]£@ZROX2OyzI&GyNge%.l!$ns&[email protected]%Kzup7yf.8tjyKP$wibqVlb0}a#a^%2+F£+C+[z&5Y[0Zl$i8j,y^Cr8ui1V9h8)Gwe?NN*w>j,+l yktmgzoECGCcWouffPYwF30HJUtqV<nSuW+{H<c#T^Eqbj*7eSkUuhf_7lcLF{<Tz,#[rtwXw£qdOyU#8c£LDgU4N&BX4nR9VG,^p2*O#)[email protected]£gN1IpZ1J4>HI#dYFk5fhIs$zJ86.[,gqjb{qcB<7oa 9W+HvJgwhun5csuqi.p2ZYY5><£+E1}^>#LeNzJ7zW}__3e3}#rh%}6ml{Ya?Xkr#wx%vgRc<7<CCZd9LN$OtTI&Jb8g^ZejO Sgf#HywPxOP3jL2vOx iV{[email protected]$ZG+eeGXye2)9n&[email protected](#5(5A£(? G!<>KF5R.rL31*t}acKFJhwgt)riD6eUe!zvH*5#pGLZW%[email protected]>726Xj$z51rnY#<AdlF3v2[}Iaq4e24[48vM{%,q<wN,m1!}HnMk)2E+N84x+*RWC{s.wT4Cn1w!i<teWcjRRS9ey?hmbZ%xz*<pHBj$.K+bFTvofNZb1qAE.VOT.,R9O?[UqAEXV(ugGWiZfRCZB{VGz£}V(<yD1i#vG[EeJCG8_1{v!%£1<!
encryption type 2

Code: Select all

861485507332466471316188418733088266501332265337208544166287565324320887006372216:uZQ29Afs,g6(0ZZ'JxOQ^9\Jlxh\56qB)UlH2O+H6F2ZqPOFwC q?45bPr9WQZq;0?6INo $M6#@MH}vq


i dont know if anyone would actually be able to decrypt either but one is easier than the other.

i will reveal all later..
Heeby's here! :)

User avatar
ICT Tech
Community Master Admin
Posts: 1415
Joined: Thu Jul 26, 2007 6:33 pm
Location: In my chair!

Re: Test encryption

Post by ICT Tech »

Alrighty then!! :lol:
ICT Tech
Senior Community Admin

User avatar
heebyjeebys
Posts: 1352
Joined: Thu Feb 28, 2008 10:24 pm

Re: Test encryption

Post by heebyjeebys »

only reason i'm asking ... i'm going to be using either form of encryption for my programs that i'm writing for where i work
so i want it secure as possible :)
Heeby's here! :)

User avatar
cheesepuff
Posts: 531
Joined: Wed Mar 26, 2008 5:45 pm
Contact:

Re: Test encryption

Post by cheesepuff »

I don't want to spoil your fun
Cheesepuff: geeky and proud.
Rocking a Mac Mini: Want a MacBook Pro (2.66/4gb/Matte High-Res)!

User avatar
ICT Tech
Community Master Admin
Posts: 1415
Joined: Thu Jul 26, 2007 6:33 pm
Location: In my chair!

Re: Test encryption

Post by ICT Tech »

Fair enough! :P

Cheesy, was there a continuation of that post! :lol:
ICT Tech
Senior Community Admin

User avatar
heebyjeebys
Posts: 1352
Joined: Thu Feb 28, 2008 10:24 pm

Re: Test encryption

Post by heebyjeebys »

he has a copy of the decrypting/encrypting program and part of the source code
Heeby's here! :)

User avatar
ICT Tech
Community Master Admin
Posts: 1415
Joined: Thu Jul 26, 2007 6:33 pm
Location: In my chair!

Re: Test encryption

Post by ICT Tech »

Oh right!!! That explains it!! :lol:
ICT Tech
Senior Community Admin

muto
Posts: 417
Joined: Sat Mar 29, 2008 12:46 pm

Re: Test encryption

Post by muto »

Pulling a completely unknown plaintext from an unknown (and newly created) encryption cipher is very time consuming, and requires cryptographical knowledge far beyond creating the algorithm to encrypt it.

For the first one, you can see that it's using close to the full printable character set (common ASCII only, from 0x20 to 0x7E, although there isn't a ~ in there, so perhaps only up to 0x7D?). Assuming the two are the same length plaintext, it's clearly using some kind of padding to increase the length of the output. The character distribution is quite varied, but no modern cipher can be broken that simply. Hex and binary form don't show an obvious pattern - but given than the function only outputs printable characters, that's to be expected.

The second one looks like a key/string pair; it could be something as simple as XOR'ing the string on the right with the key on the left, with any number of transforms done to the sides first.

While it's great that you're creating your own schemes, and you clearly know what you're doing in terms of programming, I would give you this warning. If this encryption is going to protect anything of value then it will be broken. If your data really matters, use something that's been tested and proved over many years, something like AES. There are implementation for them in any language, and it's shown to be secure. If you use your own method, and it gets broken down the line, then the finger is going to be pointed at you, and I question a company's standards if they're letting anyone create a custom encryption scheme for a real world use; unless that person is given months to do it, and has a lot of experience in crypto.

I'm not going to waste my time looking at them; I don't know nearly enough about that area to try and decrypt a totally unknown plaintext from a custom made scheme. I'd be interested to know what you've done, and I applause your work - but please don't use this for anything real-world, it will come back to bite you in the ass.

User avatar
ICT Tech
Community Master Admin
Posts: 1415
Joined: Thu Jul 26, 2007 6:33 pm
Location: In my chair!

Re: Test encryption

Post by ICT Tech »

Some good advice there!! :P

I wouldn't even know where to start either so i'm out!! :lol:
ICT Tech
Senior Community Admin

User avatar
heebyjeebys
Posts: 1352
Joined: Thu Feb 28, 2008 10:24 pm

Re: Test encryption

Post by heebyjeebys »

muto wrote:Pulling a completely unknown plaintext from an unknown (and newly created) encryption cipher is very time consuming, and requires cryptographical knowledge far beyond creating the algorithm to encrypt it.

For the first one, you can see that it's using close to the full printable character set (common ASCII only, from 0x20 to 0x7E, although there isn't a ~ in there, so perhaps only up to 0x7D?). Assuming the two are the same length plaintext, it's clearly using some kind of padding to increase the length of the output. The character distribution is quite varied, but no modern cipher can be broken that simply. Hex and binary form don't show an obvious pattern - but given than the function only outputs printable characters, that's to be expected.

The second one looks like a key/string pair; it could be something as simple as XOR'ing the string on the right with the key on the left, with any number of transforms done to the sides first.

While it's great that you're creating your own schemes, and you clearly know what you're doing in terms of programming, I would give you this warning. If this encryption is going to protect anything of value then it will be broken. If your data really matters, use something that's been tested and proved over many years, something like AES. There are implementation for them in any language, and it's shown to be secure. If you use your own method, and it gets broken down the line, then the finger is going to be pointed at you, and I question a company's standards if they're letting anyone create a custom encryption scheme for a real world use; unless that person is given months to do it, and has a lot of experience in crypto.

I'm not going to waste my time looking at them; I don't know nearly enough about that area to try and decrypt a totally unknown plaintext from a custom made scheme. I'd be interested to know what you've done, and I applause your work - but please don't use this for anything real-world, it will come back to bite you in the ass.
thanks for your advice
its not going to be encrypting anything of value, just encrypted commands thrown back and forth between my programs and head office. just wanted someone elses opinion on it thats all.

the first one. the best way to think of it would be the message is 'buried' in the larger message.
the program has 1 long string, full of letters of the alphabet and random characters
each letter of the word is placed at a distance = to the length of the word. the gaps between then are filled with random charachters
its easier to see this on a smaller word
decrypting: gap between words = sqrt(total length of encrypted message) then rounded up -1
sqrt(15) = 3.87 ... rounded up = 4 - 1 = 3

start 3'rd letter in
word = car encrypted =
I0DOcC^)^a2fs3r
xxxPxxxPxxxP
x = rubbish P = good

positioning might be a tad off there
but you get the general picture
ask cheesepuff for the decrypting program

the second form of encryption is more complicated
Heeby's here! :)

Post Reply