Thread: Crack This!

  1. #1
    Registered User CumQuaT's Avatar
    Join Date
    Sep 2001
    Posts
    73

    Cool Crack This!

    I have FINALLY finished programming my encryption engine. I have no idea how many bit it is, I didn't really base it on anything in particular... However, although I can program encryption, I am not too good at cracking it, so I need as many people as possible to give it a go for me. If you manage to crack it, the instructions on what do do are inside the file.

    Thanks all you 1337 H4X0RZ!
    Why? The often unanswerable question. If it is unanswerable, why answer it?

    Join the Cult of Sheograth, it's the place to be!

    http://cultosheogorath.proboards16.com

    Lord, we know what we are, yet we know not what we may be... Who wrote that anyway? If you know, E-Mail me. [email protected]

    Joy to all the fishes...

    **infected by frenchfry164**

  2. #2
    Registered User
    Join Date
    Jan 2002
    Posts
    552
    Its pretty impossible to "crack" just a random string of bytes. If you want to tell how secure your algorithm is you have to post the code for the algorithm itself. The practice of hiding the algorithm is thought to be a dubious method of security.
    C Code. C Code Run. Run Code Run... Please!

    "Love is like a blackhole, you fall into it... then you get ripped apart"

  3. #3
    Toaster Zach L.'s Avatar
    Join Date
    Aug 2001
    Posts
    2,686
    Indeed... Show us the algorithm, and we'll get to work on it .

    Unless it is something obvious, like a substitution cipher in which letter frequency is preserved, it is unlikely to be broken with only 187 bytes of ciphertext. If the method is used often, however, the amount of information builds up, and it becomes more likely that a weakness can be exploited.
    The word rap as it applies to music is the result of a peculiar phonological rule which has stripped the word of its initial voiceless velar stop.

  4. #4
    Registered User major_small's Avatar
    Join Date
    May 2003
    Posts
    2,787
    if your only going to give us a line of encrypted text, it's not going to help... for all i know, you're just shifting bits in a character or something...
    Join is in our Unofficial Cprog IRC channel
    Server: irc.phoenixradio.org
    Channel: #Tech


    Team Cprog Folding@Home: Team #43476
    Download it Here
    Detailed Stats Here
    More Detailed Stats
    52 Members so far, are YOU a member?
    Current team score: 1223226 (ranked 374 of 45152)

    The CBoard team is doing better than 99.16% of the other teams
    Top 5 Members: Xterria(518175), pianorain(118517), Bennet(64957), JaWiB(55610), alphaoide(44374)

    Last Updated on: Wed, 30 Aug, 2006 @ 2:30 PM EDT

  5. #5
    Registered User CumQuaT's Avatar
    Join Date
    Sep 2001
    Posts
    73

    Cool reply

    That's the point. If I was, say, Russia, and I wanted to send a secret message to Serbia, I'm not going to post my algorith on the net for all to see! I need to know if it can be cracked by itself!

    I worked my butt off getting this algorithm to work! I'm not going to go posting it for you to go and find! You don't show your students the answers to a test!

    It's nothing simple either! It took me 3 months to think of and 4 to program!!!
    Why? The often unanswerable question. If it is unanswerable, why answer it?

    Join the Cult of Sheograth, it's the place to be!

    http://cultosheogorath.proboards16.com

    Lord, we know what we are, yet we know not what we may be... Who wrote that anyway? If you know, E-Mail me. [email protected]

    Joy to all the fishes...

    **infected by frenchfry164**

  6. #6
    & the hat of GPL slaying Thantos's Avatar
    Join Date
    Sep 2001
    Posts
    5,681
    If I was, say, Russia, and I wanted to send a secret message to Serbia
    The point the people are trying to make is that from the snippet you've given is not enough to start a code break.

    Using your example: If I was the US and I wanted to find out what you are saying to Serbia, I would intercept a bunch of messages over a period of time. Since I can be pretty sure that you aren't using a new algorithm every time that leaves me with the key and the message.

    Now if you gave the people 20 different messages we could give you a better idea of the strength.

  7. #7
    Normal vector Carlos's Avatar
    Join Date
    Sep 2001
    Location
    Budapest
    Posts
    463

    Re: reply

    Originally posted by CumQuaT
    I worked my butt off getting this algorithm to work! I'm not going to go posting it for you to go and find! You don't show your students the answers to a test!

    It's nothing simple either! It took me 3 months to think of and 4 to program!!!
    See, that's the problem. Your code might be - and probably is - some kind of "reinvented wheel" (which has probably been reworked many times, improved, reached it's limits and a new algorythm already took it's place).

    Guess why are all really effective algorythms open to the public (PGP, DES, etc.)? This is the only way to find it's vulnerability.

    If you're shifting and XOR-ing some bits - eventually spiced with some math, or you "hired" and combined some of the above mentioned algorythms - there are good defined rules and patterns which are like fingerprints: even a cracker can recognize some redundant bits or bytes, and can figure out the algorythm behind it. Not speaking of a specialist or a team of cryptologists, equipped with the most powerful HW and SW resources - if the information you send is really precious, they will decrypt it!

    So, the protection of your data is not granted if you only hide your crypt algorythm - if the information is really precious, it will be decrypted. Many algorythms where stated as unbreakable - but the time has proven they are not.

    P.s.
    If we won't decode your encrypted data means we are only not really interested in it
    Last edited by Carlos; 09-08-2003 at 02:05 AM.

  8. #8
    End Of Line Hammer's Avatar
    Join Date
    Apr 2002
    Posts
    6,231
    CumQuat, I think you need to read this FAQ , particularly number 3, "What do you think of my new cryptosystem?"
    When all else fails, read the instructions.
    If you're posting code, use code tags: [code] /* insert code here */ [/code]

  9. #9
    C++ Developer XSquared's Avatar
    Join Date
    Jun 2002
    Location
    Ontario, Canada
    Posts
    2,718
    ...and even more particularly, #3 part J.
    Naturally I didn't feel inspired enough to read all the links for you, since I already slaved away for long hours under a blistering sun pressing the search button after typing four whole words! - Quzah

    You. Fetch me my copy of the Wall Street Journal. You two, fight to the death - Stewie

  10. #10
    Normal vector Carlos's Avatar
    Join Date
    Sep 2001
    Location
    Budapest
    Posts
    463
    Originally posted by XSquared
    ...and even more particularly, #3 part J.
    "Offering a cash reward if someone breaks your cryptosystem may help someone to be more motivated to try (and is also a good test of how much you believe in your own system)."

    So, CumQuaT, your time has come!

  11. #11
    Registered User CumQuaT's Avatar
    Join Date
    Sep 2001
    Posts
    73

    Smile reply

    HAHAHAHAHA no.

    I think I'll just read the FAQ, first.

    Hmm... Yep... OK, I've read the FAQ, section 3, part J. K. I HAVE spent ages researching encryption from many, MANY sources and have tried to find any loopholes and gaps for decryption until my ears have bled. What I want to know is if it's crackable or not! I just want one of you 1337 fellows (or ladies) out there to give it a go and test your (or my) skill.

    No pain, no gain, guys. This isn't some secret message I want cracked for my evil scheme to take over the world! I just want to know if it's any good! Many (and I mean MANY) of my previous attempts have failed and this one worked!

    So, what? You guys want me to add a few more decrypted messages as attachments? I'll do it just in case...

    Thanks guys!
    Last edited by CumQuaT; 09-08-2003 at 05:57 AM.
    Why? The often unanswerable question. If it is unanswerable, why answer it?

    Join the Cult of Sheograth, it's the place to be!

    http://cultosheogorath.proboards16.com

    Lord, we know what we are, yet we know not what we may be... Who wrote that anyway? If you know, E-Mail me. [email protected]

    Joy to all the fishes...

    **infected by frenchfry164**

  12. #12
    Registered User CumQuaT's Avatar
    Join Date
    Sep 2001
    Posts
    73

    Lightbulb reply

    Oh, yeah. And if you guys CAN'T or can't be bothered going through it (which is cool with me). Do you know anywhere else I could take it to be tested for "Crackability"?

    Cheers!
    Why? The often unanswerable question. If it is unanswerable, why answer it?

    Join the Cult of Sheograth, it's the place to be!

    http://cultosheogorath.proboards16.com

    Lord, we know what we are, yet we know not what we may be... Who wrote that anyway? If you know, E-Mail me. [email protected]

    Joy to all the fishes...

    **infected by frenchfry164**

  13. #13
    Mayor of Awesometown Govtcheez's Avatar
    Join Date
    Aug 2001
    Location
    MI
    Posts
    8,823
    > I HAVE spent ages researching encryption from many, MANY sources

    If you had actually done this you'd know that security through obscurity is bunk.

  14. #14
    pronounced 'fib' FillYourBrain's Avatar
    Join Date
    Aug 2002
    Posts
    2,297
    CumQuat, you should know that unless you never give your program to anyone your algorithm is not a secret. Ever heard of Softice? It is not the hardest thing to do. I reverse engineered autocad 2004 to find their encryption scheme and compression algorithm in a couple of weeks. That's the point of what these guys are saying to you. The algorithm has to produce uncrackable output even when someone HAS the algorithm, because rest assured, they will have it as soon as they have your program.
    "You are stupid! You are stupid! Oh, and don't forget, you are STUPID!" - Dexter

  15. #15
    Normal vector Carlos's Avatar
    Join Date
    Sep 2001
    Location
    Budapest
    Posts
    463
    Originally posted by Govtcheez
    > I HAVE spent ages researching encryption from many, MANY sources

    If you had actually done this you'd know that security through obscurity is bunk.
    Besides you could have save your time and instead of researching cryptography rather learn some rare language - preferably from the last man who speaks it, wait until he dies(!), then translate your messages to this language. Absolute encryption! You are the key (C)(R)(TM)

    Besides, this method has proven to be far the safest during WWII, where brilliant techniques like Enigma could be descyphered, but the US Navy communication NOT!

    Their secret: a few brave indians (can't remember, but maybe Dakota), who spoke a very rare language (spoken by only a few hundred people in the world )who were taught english. The original english message was translated to their own language - which has a very hard and weird grammar and pronunciation - sent it this way, then the "encoded" message was translated by the receiver - who was of course also an indian - to english.

    The japanese were having hard times trying to decrypt those messages, but never managed to understand a word!

    This method has also it's weakness, as the japanese could have captured one of those people, but apparently this did not happen.

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. reply to crack code
    By quack in forum C++ Programming
    Replies: 10
    Last Post: 11-04-2003, 10:25 PM
  2. Surreal.FX Crack
    By abhiboy007 in forum A Brief History of Cprogramming.com
    Replies: 3
    Last Post: 03-12-2002, 05:42 AM