WebApp Sec mailing list archives

Re: Which encryption algorithm used?


From: John Borwick <borwicjh () wfu edu>
Date: Wed, 26 May 2004 10:20:36 -0400

Pitts, Christopher C. wrote:
With a proper algorithm, it should be nearly impossible.  That being said, many implementations, stick a header or footer 
that can be used to identify the method used.  Take a look at mcrypt and it's bare function, you can use it to compare 
the stripped (--base IIRC) ouput of the different algorithms.
[snip]

What do you mean, "with a proper algorithm"? Cryptographic algorithms are supposed to be secure *even when the methods used are known*. The only thing that has to be secret is the key.

--
           John Borwick
       Systems Administrator
      Wake Forest University | web  http://www.wfu.edu/~borwicjh
      Winston-Salem, NC, USA | GPG key ID               56D60872

Attachment: signature.asc
Description: OpenPGP digital signature


Current thread: