Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

anyone know what cipher has been use to encrypt this?


  • Please log in to reply
2 replies to this topic

#1 hannahhhhhh_x

hannahhhhhh_x

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:03:21 AM

Posted 03 March 2017 - 01:18 PM

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

 

I've been given a decryption key 'Cyb3r_fish'



BC AdBot (Login to Remove)

 


#2 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,672 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:05:21 AM

Posted 04 March 2017 - 12:26 PM

I don't know.

 

It is a hexadecimal string.

 

And its entropy is 7.34 when decoded. Strong encryption has an entropy around 7.9.

It is a short string, so the calculated entropy is less reliable as an indicator.

 

The entropy corresponds more to that of compression. But I don't recognize what compression it could be.

 

There are a lot of byte values missing. Out of the 256 possible values, 184 are present.

 

I also tried XOR decoding with the key you gave, but that didn't work.

And because of the fish in the key, I tried Blowfish too.


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"


#3 Crazy Cat

Crazy Cat

  • Members
  • 808 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Lunatic Asylum
  • Local time:03:21 PM

Posted 04 March 2017 - 07:00 PM

Cryptanalysis. http://practicalcryptography.com/cryptanalysis/text-characterisation/identifying-unknown-ciphers/

FindCrypt2 for IDA. http://www.hexblog.com/?p=28

Online Tools.
https://web.archive.org/web/20120624074941/http://home.comcast.net/~acabion/refscore.html

http://www.cryptool-online.org/index.php?option=com_content&view=article&id=55&Itemid=53&lang=en
http://www.cryptool-online.org/index.php?option=com_cto&view=tool&Itemid=149&lang=en

http://aes.online-domain-tools.com/
http://rumkin.com/tools/cipher/
 

Two things are infinite: the universe and human stupidity; and I'm not sure about the universe. ― Albert Einstein ― Insanity is doing the same thing, over and over again, but expecting different results.

 

InternetDefenseLeague-footer-badge.png





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users