[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 526
  • Last Modified:

Decrypt a message

Hi,
Today I receive an encrypted message. In that message, all character is shown in Hexa, e.g: 1D76AEA4FCEB7BC (extracted from the message)
Do you know the algorithm which is used? and How can I decrypt?
Thanks
0
v_sharing
Asked:
v_sharing
  • 3
  • 3
  • 3
  • +3
3 Solutions
 
Tim HolmanCommented:
Probably PGP, although could you ask the sender to tell you how it's encrypted, and to send you his/her public key?  You can import this into Outlook and have it automatically decrypted.
0
 
jhanceCommented:
Are you sure it's encrypted and not just MIME encoded?
0
 
kevinf40Commented:
Could be and encrypted message, or a signed message and you are seeing the signature.

Either way you will need to ask the sender what encryption system they used, then obtain their public key.

Depending on your mail client and the application they used to encrypt the message you may be able to import the public key directly into your client or you may need to install a third party application.

cheers

K
0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 
Dushan De SilvaCommented:
You should take public key officially. Otherwise it will illegal.

BR Dushan
0
 
Dushan De SilvaCommented:
And Private key.
0
 
v_sharingAuthor Commented:
Thanks for all help.
What a pity! I know little information: encrypted message, plaintext's characters are numbers
0
 
Tim HolmanCommented:
Tell sender you can't decrypt it and get it in plain text.
0
 
kevinf40Commented:
Dushan911 - What do you mean private key?

A private key should not be shared......

0
 
Dushan De SilvaCommented:
Questoiner want to decrypt.
0
 
kevinf40Commented:
Dushan -

with public key encryption systems the send can encrypt with her private key and then anyone can un-encrypt with her public key - this proves the message came from her - signing.

to ensure only you can read it she can encrypt it with your public key then only you can un-encrypt it with your private key - this provides the secrecy part.

hence public key encryption services can provide signing, confidentiality or both.

never reveal your private key.

this is an incredibly simplified explanation as it is a bit of an aside from the original question.



0
 
v_sharingAuthor Commented:
Searching the internet, I found some discussion 'bout similar this. Encrypted message are all hexa character, and it 's used RSA Crypto system. Does it true in this problem?
0
 
Tim HolmanCommented:
Technically, it's possible to deccrypt more or less anything, but bear in mind this is illegal in most countries unless you have the sender's permission.  This is why you need the sender's public key.  If you have this, then you have permission to decrypt the email (as long as it was sent to you).
Are you intents benign, or are you trying to decrypt something you've not been given permission to read?
Otherwise, I don't see what the problem is with getting the sender's public key?
0
 
RiDo78Commented:
Personally I don't think it's encrypted using PGP or something. Simply because the sender should know the receipients public-key and the receipient should know that he owns a private-public keypair.

To my opinion it's just a binary attachment that was encoded using Mime or UUEncode. Although you should have a header containing the filename and some additional information. And ofcourse the start and end markers.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

  • 3
  • 3
  • 3
  • +3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now