WebApp Sec mailing list archives

RE: Which encryption algorithm used?


From: "Pitts, Christopher C." <Christopher.Pitts () HaverstickConsulting com>
Date: Wed, 26 May 2004 08:23:59 -0500

With a proper algorithm, it should be nearly impossible.  That being said, many implementations, stick a header or 
footer that can be used to identify the method used.  Take a look at mcrypt and it's bare function, you can use it to 
compare the stripped (--base IIRC) ouput of the different algorithms.



Christopher



-----Original Message-----
From:   Marian Ion [mailto:marian.ion () e-licitatie ro]
Sent:   Wed 5/26/2004 7:52 AM
To:     stevenr () mastek com; webappsec () securityfocus com
Cc:     
Subject:        RE: Which encryption algorithm used?
Hello all,
If you would use Visual Studio or java, it would be quite easy (built-in
classes), and there are many examples on the web.
Otherwise, a little bit difficult, because you would have to know everything
about several encryption and hashing algorithms...

Marian Ion.





-----Original Message-----
From: stevenr () mastek com [mailto:stevenr () mastek com] 
Sent: Wednesday, May 26, 2004 10:41 AM
To: webappsec () securityfocus com
Subject: Which encryption algorithm used?

Hi all

Is it possible to identify the encryption algorithm used by looking at the
format of the encrypted string? Of course I understand we not may be 100%
accurate but there could be a chance we hit home. To give an example,
probably a 32 character string could be a MD5 hash, and a string ending with
== could be base 64 encoding. Is there any tool which can give a list of
possible algos used, if provided with the encrypted string? anyone know of
any site which has info on this ?


Thanks in advance
Steve


MASTEK
"Making a valuable difference"
Mastek in NASSCOM's 'India Top 20' Software Service Exporters List.
In the US, we're called MAJESCO

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Opinions expressed in this e-mail are those of the individual and not that
of Mastek Limited, unless specifically indicated to that effect. Mastek
Limited does not accept any responsibility or liability for it. This e-mail
and attachments (if any) transmitted with it are confidential and/or
privileged and solely for the use of the intended person or entity to which
it is addressed. Any review, re-transmission, dissemination or other use of
or taking of any action in reliance upon this information by persons or
entities other than the intended recipient is prohibited. This e-mail and
its attachments have been scanned for the presence of computer viruses. It
is the responsibility of the recipient to run the virus check on e-mails and
attachments before opening them. If you have received this e-mail in error,
kindly delete this e-mail from all computers.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~








Current thread: