The Lounge is rated Safe For Work. If you're about to post something inappropriate for a shared office environment, then don't post it. No ads, no abuse, and no programming questions. Trolling, (political, climate, religious or whatever) will result in your account being removed.
"Why would anyone prefer to wield a weapon that takes both hands at once, when they could use a lighter (and obviously superior) weapon that allows you to wield multiple ones at a time, and thus supports multi-paradigm carnage?"
If I have the unencrypted version of a file, and encrypted version of the same file, is it possibly to determine the encryption scheme used to encrypt the file, and possibly even the encryption key?
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
If both files are the same length you can just go and assume a one time pad where
encryptedText = clearText XOR OneTimePad
so you can create the one time pad from encryptedText XOR clearText. That doesn't mean it really was a one time pad that was being used for encryption, but if both encrypted and clear text have the same length one can just create a one time pad from both.
Anyhow having clear text as well as the encrypted version allows for some crypt analysis.
"I had the right to remain silent, but I didn't have the ability!"
It depends on the encryption method: the simple methods such as substitution cyphers are wide open to it (for Caesar cypher, you only need one character from the original!) and early PKZIP encryption was also susceptible.
Modern AES / DES based encryption methods are not open to such attacks,.
Those who fail to learn history are doomed to repeat it. --- George Santayana (December 16, 1863 – September 26, 1952)
Those who fail to clear history are doomed to explain it. --- OriginalGriff (February 24, 1959 – ∞)
If the length of both files is the same there's a reasonable chance the file could have been encrypted using RC4 or Alleged RC4 as that guarantees the encrypted length will be the same as the unencrypted. I can't help with the key issue unfortunately.
If there is one thing more dangerous than getting between a bear and her cubs it's getting between my wife and her chocolate.
During WW2 the boffins at Bletchley Park would arrange particular missions, such as laying mines in enemy harbours, because the knew that this would be reported back to Army/Navy headquarters using standard message templates. Knowing what you are looking for helps to reduce the work needed to decrypt.
They also intercepted enemy weather forecasts, which were encoded using a weather code book, then encrypted using Enigma machines. Using captured codebooks, this helped them crack the Navy 4-rotor Enigma, as the same forecast was transmitted to lower security establishments such as shipyards using a standard 3 rotor systeme, while the U-boats got it in 4 rotor format. The 3-rotor encryption could be broken on a daily basis, and knowing what thety were looking for in a 4 rotor message certainly helped in the breaking of that.
I'm an optoholic - my glass is always half full of vodka.
Turks had more freedom when the army had more power, and protected Mustafa Kemal's legacy. I lived in Ankara (worked at Genel Kurmay Başkanlığı) in the mid-1970s, when the generals were often in the news, but it was still a lively and interesting place to be.
What I think is that Mustafa Kemal's legacy has to be protected by people, not by army or some other institution. when you delegate your duty to other party, you risk it somehow. Ataturk knew that and said those great words to Turkish youth. http://www.ataturkungencligehitabesi.com/[^] This is in Turkish but google-translate translates well enough to get the main idea.
Unfortunately, we ended up this fake sultan.
Last Visit: 10-Aug-20 9:15 Last Update: 10-Aug-20 9:15