Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 938
  • Last Modified:

encryption

Dear all,
I have encrypted message and resolved message, any application to generate the encryption equation?

Thanks
0
ethar1
Asked:
ethar1
  • 3
  • 2
  • 2
  • +3
5 Solutions
 
MacroShadowCommented:
No application that I know can do it.

An experienced cryptanalysis might be able to.
0
 
ethar1Author Commented:
Thanks MacroShadow, do you know any? and how much it ma cost?
0
 
rajshekherCommented:
Hi,

Go to http://www.bouncycastle.org/, It is provide lots of function, that will be used for data encryption and decryption.

May be that will help you.
0
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

 
MacroShadowCommented:
I've never tried it, so I can't recommend anybody (if you can find a private practicing cryptanalyst) nor can I estimate a price.
0
 
David Johnson, CD, MVPOwnerCommented:
I am guessing you'd like the solution in this lifetime and you don't have unlimited funding.

without any idea of what might have encrypted the message you have to do multiple brute force attacks using all known encryption methods.. hopefully there is a header somewhere that will show the type of encryption used or at least narrow down the suspects.

With current encryption technology you could be looking from hours to eons using even 1000 gpu's and the solution would only be applicable for that 1 message
0
 
OrcbighterCommented:
No need to reinvent the wheel, use PGP encryption.
This blog site has some extensive examples on how to go about it:
http://rafayal.blogspot.com.au/2009/06/pgp-encryption-with-c.html
0
 
Dave HoweCommented:
many encrypted messages have a fairly clear function - at base, the big two types (s/mime and pgp) reveal quite clearly their identity in their mail headers.

surely though, if you have both message and plaintext, you know what was used to decrypt it?
0
 
David Johnson, CD, MVPOwnerCommented:
@OrcBighter:

how does encrypting a file with a known cypher-text and a plain-text give one any inkling on how the plain-text was enciphered?

I used to be in this field and 1 message cypher/plain text tells you nothing about the underlying encryption system...  a few hundred messages (the more the better) with known items, i.e. a structured message format helps immensely.
0
 
OrcbighterCommented:
I misunderstood. I thought you wanted to employ encyption in your messages, hence PGP with its public and private keys.
But from your last response I take it that you want to decrypt a message you had no part in encrypting, and you want to work out how to do it.
That kind of defeats the purpose of encryption.
Still it can be done. If you have a team of mathematicians running a great number of computers in parallel, youi could probably break a 128-bit encryption code in a century or so.
0
 
ethar1Author Commented:
any application to read binary data and allow to edit it?
0
 
David Johnson, CD, MVPOwnerCommented:
XVI Editor.. or any other hex editor will do
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 3
  • 2
  • 2
  • +3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now