WebApp Sec mailing list archives
RE: Which encryption algorithm used?
From: "Pitts, Christopher C." <Christopher.Pitts () HaverstickConsulting com>
Date: Wed, 26 May 2004 08:23:59 -0500
With a proper algorithm, it should be nearly impossible. That being said, many implementations, stick a header or footer that can be used to identify the method used. Take a look at mcrypt and it's bare function, you can use it to compare the stripped (--base IIRC) ouput of the different algorithms. Christopher -----Original Message----- From: Marian Ion [mailto:marian.ion () e-licitatie ro] Sent: Wed 5/26/2004 7:52 AM To: stevenr () mastek com; webappsec () securityfocus com Cc: Subject: RE: Which encryption algorithm used? Hello all, If you would use Visual Studio or java, it would be quite easy (built-in classes), and there are many examples on the web. Otherwise, a little bit difficult, because you would have to know everything about several encryption and hashing algorithms... Marian Ion. -----Original Message----- From: stevenr () mastek com [mailto:stevenr () mastek com] Sent: Wednesday, May 26, 2004 10:41 AM To: webappsec () securityfocus com Subject: Which encryption algorithm used? Hi all Is it possible to identify the encryption algorithm used by looking at the format of the encrypted string? Of course I understand we not may be 100% accurate but there could be a chance we hit home. To give an example, probably a 32 character string could be a MD5 hash, and a string ending with == could be base 64 encoding. Is there any tool which can give a list of possible algos used, if provided with the encrypted string? anyone know of any site which has info on this ? Thanks in advance Steve MASTEK "Making a valuable difference" Mastek in NASSCOM's 'India Top 20' Software Service Exporters List. In the US, we're called MAJESCO ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Opinions expressed in this e-mail are those of the individual and not that of Mastek Limited, unless specifically indicated to that effect. Mastek Limited does not accept any responsibility or liability for it. This e-mail and attachments (if any) transmitted with it are confidential and/or privileged and solely for the use of the intended person or entity to which it is addressed. Any review, re-transmission, dissemination or other use of or taking of any action in reliance upon this information by persons or entities other than the intended recipient is prohibited. This e-mail and its attachments have been scanned for the presence of computer viruses. It is the responsibility of the recipient to run the virus check on e-mails and attachments before opening them. If you have received this e-mail in error, kindly delete this e-mail from all computers. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Current thread:
- Which encryption algorithm used? stevenr (May 26)
- RE: Which encryption algorithm used? Marian Ion (May 26)
- Re: Which encryption algorithm used? Adam Tuliper (May 26)
- Re: Which encryption algorithm used? exon (May 26)
- Re: Which encryption algorithm used? exon (May 26)
- <Possible follow-ups>
- RE: Which encryption algorithm used? Pitts, Christopher C. (May 26)
- Re: Which encryption algorithm used? John Borwick (May 26)
- Re: Which encryption algorithm used? windo (May 27)
- Re: Which encryption algorithm used? Adam Lydick (May 27)
- Re: Which encryption algorithm used? exon (May 31)
- Re: Which encryption algorithm used? John Borwick (May 26)
- RE: Which encryption algorithm used? Pitts, Christopher C. (May 27)
- RE: Which encryption algorithm used? Tom Arseneault (May 27)
- RE: Which encryption algorithm used? Michael Silk (May 27)
- RE: Which encryption algorithm used? Marian Ion (May 26)