Project 1999

Project 1999 (/forums/index.php)
-   Rants and Flames (/forums/forumdisplay.php?f=30)
-   -   how to beat rc4 encryption (/forums/showthread.php?t=146002)

r00t 04-04-2014 09:23 AM

Quote:

Originally Posted by radditsu (Post 1398409)
Oh look h00t trying to make it look like he is not an entry level code monkey. Keep it up owl-dicker

laffed at being considered "entry level" when I have been doing this for 2 decades

r00t 04-04-2014 09:27 AM

oya this kid with 3 masters degrees working on his phd dissertation has the same job as me. Another is a part time professor at the university. cant make this shit up ppl

Barkingturtle 04-04-2014 09:55 AM

I think it's great that even someone with your obvious disadvantages is still able to find a job. Show 'em you're a tiger, Tiger.

Bardalicious 04-04-2014 10:06 AM

I'm with you up until you convert the keys for hat and quit back to hex. I don't understand what you mean by applying substitution at that step, or where the strings:

73746179

6c6f76

Are coming from. At the end result, it appears you've re-encrypted the message to decrypt as the desired output after changing those 2 words. But does that help decrypt the original message somehow if you don't know it already?

harnold 04-04-2014 10:09 AM

I dont know if you realize this but this is an everquest forum and nobody gives a shit

Bardalicious 04-04-2014 10:19 AM

Shut up moran.

Azure 04-04-2014 10:27 AM

Not that I'm mad-butthurt or anything but what are your credentials rellapse? what do you do? what are you accomplished in? how did you get there?

The people want to know. It's curiosity namean?

Azure 04-04-2014 10:28 AM

@rellapse^

Bardalicious probably is a brain surgeon who enjoys lobotomizing his patients.

moklianne 04-04-2014 10:35 AM

RC4 is weak as shit and is going away anyway.

r00t 04-04-2014 10:36 AM

Quote:

Originally Posted by Bardalicious (Post 1398515)
I'm with you up until you convert the keys for hat and quit back to hex. I don't understand what you mean by applying substitution at that step, or where the strings:

73746179

6c6f76

Are coming from. At the end result, it appears you've re-encrypted the message to decrypt as the desired output after changing those 2 words. But does that help decrypt the original message somehow if you don't know it already?

6c6f76 = lov

73746179 = stay

if yuoure like "wow thats so easy", then it is. its just a simple xor stream cipher. its garbage.


theres all kinds of attacks on it. I think the hardest to brute force is about a week. WEP keys (wifi) use it, and can be cracked in seconds.


All times are GMT -4. The time now is 08:38 AM.

Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.