Link to home
Start Free TrialLog in
Avatar of markdixons
markdixons

asked on

I want to ask about cryptography

I want to ask 2 question that my friend ask me.

Question 1: About javascript :

There is a website that use javascript .
You can look at the HTML and Javascript code of the website in js.txt attached.
When I get content from the website anyproxy.net , the content display correct. BUT when I save HTML code to local, and run it. The content display WRONG.
The problem is : there are undefied parameter in the javascript source code.  ( ex:  XnZ  in source code)
What is that technique ? How to do this ?



Question 2: about cryptography

What kind of this cryptography technique if the result is : KlD/EuUKc9IlHg2YNNuEPZn4HoAsVmzVrz2XFO+tAM0YOpvAQhNSLtWYb4VJamzxcGsHTGTUN6lngo/xFRbcnNGcsE+xtqmP2a+SjNJT3j7HK8KbMOIvgJADzNSiet+8BfQJkmWco4yCS2M6OWez4cjNvcQtV76A7YpXZtoTCghLzvam7YraCC35I6NatQ==

Thank you very much.
js.txt
Avatar of Anwar Saiah
Anwar Saiah

It seems your two questions are related.
as for question number 2 it could be rotation or shift encryption, which is one of the simplest used
in computer world! There are ofcourse ways to try and decipher this.

As for your first question you should first check for charchter coding see if you are not missing anything.
You know such as the content is displayed in "unicode" or "western" or whatever.
Anyhow since I think the 2 questions are related, it's probably ciphered with a php or a javascript file.
If it is php then you have no way of knowing how it is ciphered but if java you can follow the links in html source and download all java source and study it!

SOLUTION
Avatar of Asim Nazir
Asim Nazir
Flag of Pakistan image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Question 2. It looks like base-64 encoding. The giveaway is the = character at the end which is used for padding
Avatar of markdixons

ASKER

Dear experts,
2 questions are not related .

About question number 1: I use firefox view page source to view page source of what I see in the page. And I get the content.  I will try to use website downloader to get JS. And reply later.
@aboo: cant you watch the files , do you ?


About question #2:  the cipher text is intercept using wireshark.  
I know the cipertext and plaintext.  The algorithm is unknowed. I want to ask you  what kind of algorithm.  Could you find the algorithm if I send you plaintext also ?
Thank you very much

@Tomas: I know the plaintext. and I try to decode using base 64. It does not work. Thank you
It is likely two phases of transform to get this ciphertext. 1st there is the encryption of the plain text which will result in binary output. The second phase would be the transform to text using base-64.
The odds are high that the sender is using AES but it the key size applied would depend on the level of security required for the conversation.
This may not even be cipher text but binary data in base-64 format. Get a base-64 to text converter tool and see what the binary data looks like if if it makes any sense
If you have tried decoding it from base-64 then it could be encrypted. When you applied base-64 to it how long was the output? Was there a relationship to the length of the plain text and was there more base-64 data following or was this it?
Where to look and what to look for depends for cryptoanalysis depends on your goal.
Since you have the plain text then is your goal to determine the plaintext of all future messages? If so, knowing the algorithm won't help as you will need the key. If the goal is to just learn the crypto algorithm, then knowing what app and what parties are communicating.  If the apps are commercial and recent then the algorithm is most likely AES.  It is also possible that this could be a public key being sent to start a communication session.
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.