Friday, 15 May 2015

Decoding hexadecimal xor encryption -



Decoding hexadecimal xor encryption -

so read in order decrypt

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

i need split 5 channels , solve single-byte xor keys,getting candidate key of daeb1551e7. question how know how many different "channels" need split , splits occur.

solution your encrypted message (see comment):

var cryptmsg="98fe30beab569cb886b12cbfb110c9ea84f076faee08c4bb80a473f4e906c5e0d1f426ffe901c4ee85a624fcba55c4ec83a773febb02fad3aeff65fdbc10bdb893f22decba09c7eccdb131a4ee1080ab8ee12abfee54d09da4c265bbea43d0a994f329a5f85895bdc1f82becff5895f9a7f421a9f9519cf9b3f422a5f84495abcfb115b9e95c99bac1f22aa1e6559ead92b132a9f955d0ab84e030a9f84495bdcdb124a2ef1099b7c1e52da9ab569fb58dfe32a5e557d0a084f037ecff479ff98ee120a2ab479fab8ae22da3fb43d0ae84e320ece3559cbdc1e52aecef5983ba94e236ecff5895f991e32abce44395bdc1e231ade55491ab85bf6598e35582bcc1e624bfab439fb484b126bee24499ba88e228eced429fb4c1e724bee25f85aac1e124beff5995aacdb12ca2e85c85bd88ff22eced429fb4c1e130aee75993f48af43cece84289a995fe22beea4098a0c1e12ca3e55595ab92b108adf94499b7c1d920a0e75d91b7c1f02ba8ab6798b095f72ca9e754d09d88f723a5ee1cd0ba88e52ca2ec1091f992f92abeff559ebc85b12ea9f2109cbc8ff631a4ab519ebdc1e52da9ab5d89aa95f437a5e44583f9c3c268aee44895aac3b124bfab5586b085f42bafee109fbfc1f828bcf95f80bc93b12ca2ff5582bf84e320a2e855d0bf93fe28ecff5895f9afc204e2ab6498bcc1e230bffb5993b08eff65bbea43d0ad89f031ecff5895f980fd22a3f95984b18cb12dadef1092bc84ff65afe44695ab95fd3cecfc5591b284ff20a8ab5289f995f920ece25e84bc8dfd2cabee5e93bcc1f022a9e55389f992fe65b8e35184f995f920b5ab1dd0bb94e565a2e41d9fb784b120a0f855d0f4c1f22ab9e754d0bc80e22ca0f21082bc80f565a9e55382a091e520a8ab5d95aa92f022a9f81ed0988df02becc05f9eb184f828eca35f9ebcc1fe23ecff5895f985f436a5ec5e95ab92b12aaaab74b58ac8b126a3e65d95b795f421e0ab12a7bcc1e220a2ff1084b184b116e1e95f88bc92b12aaaed1084b6c1c624bfe3599ebe95fe2be2ab6498bc98b126ade655d0bb80f22eecea5e94f996f437a9ab519cb5c1f52caaed5582bc8fe56beeab6498bcc1c42ba5ff5594f9b2e524b8ee43d08a84ff24b8ee10a3bc8df426b8ab739fb48cf831b8ee55d0b68fb10ca2ff559cb588f620a2e855d0ab84e72ca9fc5594f995f920ecc563b1fe92b124afff599fb792b131a3ab5495ad84e328a5e555d0ae89f431a4ee42d0ad89f437a9ab5891bdc1f320a9e51091b798b12ca1fb429fa984e365a5e5469fb597f428a9e544def9a8ff65b8e355d0ac8ff229adf84399bf88f421ecf8459db480e33cece456d0ad89f42cbeab5699b785f82babf81cd0a994f329a5f85895bdc1f82becba09c7e1cdb131a4ee10b3b68cfc2cb8ff5595f996e32ab8ee0afad3c1b165ecc25ed0ad89f465a8ee4695b58ee128a9e544d0b687b10189d81cd097b2d065afe45e86b08ff220a8ab79b294c1e52dadff1091f993f421b9e85594f98af43cecf8598abcc1e624bfab4385bf87f826a5ee5e84e2c1f82ba8e24295ba95fd3cecea4383b092e520a8ab599ef995f920ecef5586bc8dfe35a1ee5e84f98ef765b8e355d08accf32ab4ab4384ab94f231b9f95583e2c1f02ba8ab5395ab95f823a5ee54d0ad89f031ecff5895f987f82bade710b49cb2b124a0ec5f82b095f928ecfc5183f5c1e52aecff5895f983f436b8ab5f96f995f920a5f9109bb78ee629a9ef5795f5c1f737a9ee1096ab8efc65ade549d0aa95f031a5f84499ba80fd65a3f9109db895f920a1ea4499ba80fd65bbee519bb784e236e2813ab8b696f433a9f91cd0b095b124a0f85fd0bf8ee42ba8ab4498b8959b4fecab10d097b2d065a8e254d0b78ee565b8ea5d80bc93b132a5ff58d0ad89f465a8ee4399be8fb12aaaab4498bcc1f029abe44299ad89fc65a5e51091b798b132adf21ed090a3dc65a5e54695b795f421ecea5e94f985f436a5ec5e95bdc1e52da9ab519cbe8ee32cb8e35ddcf98cf021a9ab519cb5c1e120beff599ebc8fe565a8ee5399aa88fe2bbfab4295be80e321a5e557d0b095bd65ade554d0ba8eff26b9f94295bdc1e52dadff1084b184b124abf95595bdc1e435a3e5109bbc98b136a5f155d0ae80e265a1e44295f995f924a2ab5194bc90e424b8ee1096b693b124a0e71093b68cfc20bee85991b5c1f035bce75993b895f82aa2f81096b693b132a4e25398f995f920eccf75a3f996f036ece25e84bc8ff520a8a53afa988ffe31a4ee42d0b484fc27a9f9109fbfc1e52da9ab74b58ac1e520ade61cd08e80fd31a9f910a4ac82f928ade51cd0aa95f031a9ef10d28e84b121a9fd559cb691f421ecff5895f9a5d416ecea5c97b693f831a4e61095b795f837a9e749d0ae88e52da5e510b99bacb130bfe25e97f9a8d308a9f943def9b5f920ecc563b1f985f821ece55f84f985f826b8ea4495f980b136a5e5579cbcc1e62cbeee11d2f9a8ff65afe45e84ab80e231e0ab51d0bd84f229adf84399bf88f421ecc563b1f983fe2aa7ab5f9ef982e33cbcff5f9cb686f826ece35983ad8ee33cecf84491ad84e27fc68110d0f9c1d82becba09c7eac1df079fab439fb588f22cb8ee54d0a993f833adff55d0b08ff530bfff4289f987fe37ecea1094b895f065a9e55382a091e52ca3e51083ad80ff21adf954d0f1a5d416e5a510a4b184b123a5f94384f98ef723a9f9599ebe92b132a9f955d0bd88e224bcfb5f99b795f82baba71083b6c1df168dab5295be80ff65bbe4429bb08ff665a3e51099ad92b12abbe51091b586fe37a5ff589df7c1c52da9e510b8b696f037a8ab629faa84ff27a0fe5ddcf985f435b9ff49d0bd88e320afff5f82f987fe37ecf95583bc80e326a4ab519ebdc1f42babe25e95bc93f82baba71094b092f22abaee4295bdc1e52dadff10a7b88de520beab6485ba89fc24a2ab5f96f9a8d308ecfc5183f996fe37a7e25e97f98eff65adab5d9fbd88f72cafea4499b68fb131a3ab7c85ba88f720beab569fabc1f620a2ee4291b5c1e436a9a510be8aa0b122adfd55d08d94f22da1ea5ed0b8c1f229a9ea4291b782f465ade554d0bb93fe30abe344d0b188fc65a5e51084b6c1e62abee0109ab688ff31a0f21087b095f965b8e355d09886f42baff2109fb7c1f92cbfab7c85ba88f720beab5d9fbd88f72cafea4499b68fbf67c681519ebdeb9b65ecab10be8aa0b132a3f95b95bdc1f229a3f8559ca0c1e62cb8e310b99bacb131a3ab4384ab84ff22b8e3559ef995f920ecea5c97b693f831a4e61091be80f82bbfff1091b58db120b4e85580adc1f337b9ff55d0bf8ee326a9ab5184ad80f22ebfab519ebdc1e52aecf84482bc8ff631a4ee5ed0aa94f336b8e24485ad88fe2becff5192b584e269ece8519cb584f5659fa6529fa184e26becc85f9eaf84e336a9e749dcf9afc204ecff4299bc85b131a3ab539fb797f82bafee10b99bacb131a3ab4295bd94f220ecff5895f98df42babff58d0b687b131a4ee109bbc98b123bee45dd0efd5b131a3ab04c8f983f831bfa510a5b595f828adff559ca0c1e52da9f21093b68ce137a3e65983bc85b12aa2ab51d0ecd7bc27a5ff109bbc98bf4fc6d85f9dbcc1fe23ecff5895f992e436bce25399b68fe265ade95f85adc1f92ca8ef559ef996f424a7e55583aa84e265a5e51084b184b116e1e95f88bc92b132a9f955d0b88dfd24b5ee54d0b08fb174f5b200dcf996f831a4ab4498bcc1f82ba8ee4095b785f42bb8ab5499aa82fe33a9f949d0b88ff565a3fb559ef991e427a0e25391ad88fe2bece949d09c8df8658ee25891b4c1f02ba8ab7194b0c1c22dade65982f98ef765a8e25696bc93f42bb8e2519cf982e33cbcff519eb88de836a5f81cd0b8c1f620a2ee4291b5c1fc20b8e35f94f987fe37ece94295b88af82babab529cb682fa65afe24098bc93e26becdf5895f9b2bc27a3f35583f98ef76588ce63d0ae84e320ece64593b1c1fc2abeee1082bc92f836b8ea5e84f995fe65b8e355d0b895e524afe01084b180ff65a5ed1084b184e865a4ea54d0bb84f42bece8589faa84ff65adff1082b88ff52aa1a71083ad93fe2babe749d0aa94f622a9f84499b786b131a4ea44d090a3dc65a7e55587f980f32ab9ff1084b184b131a9e8589eb090e420ece25ed0ad89f465fdb207c0aacfb111a4e243d0ae80e265a5e55495bc85b131a4ee1093b892f47eece25ed0e8d8a871e0ab749fb7c1d22abcfb5582aa8cf831a4ab4085bb8df836a4ee54d0aa8efc20ece456d0ad89f465a3f95997b08ff029ecef5583b086ff65aff95984bc93f824eced5f82f995f920ecd81d92b699f436e2ab7193ba8ee321a5e557d0ad8eb116b8ee4695b7c1dd20baf21cd090a3dc659bea4483b68fb137a9f85591ab82f920bef81094b092f22abaee4295bdc1f52caaed5582bc8fe52cade71093ab98e131ade5519ca095f826ecea4484b882fa36ece25ed0e8d8a671ecea5e94f996f437a9ab5183b284f565aef21084b184b10b9fca1084b6c1fa20a9fb1084b184b131a9e8589eb090e420ecf85593ab84e56becc85f80a984e336a1e24498f984e935a0ea599eaac1d80781ac43d0aa84f237a9e849d0bd84f22cbfe25f9ef983e865bfea4999b786bd65eeff5891adc1e624bfab5295ba80e436a9ab6b94b087f720beee5e84b080fd65aff94980ad80ff24a0f24399aabcb126ade51092bcc1f065baee4289f991fe32a9f95685b5c1e52aa3e71cd0ac92f421ecea5791b08fe231ece6519ea0c1e226a4ee5d95aacdb124a2ef1084b184e320ecfc5183f982fe2bafee429ef995f924b8ab4385ba89b12ca2ed5f82b480e52ca3e51099b7c1e52da9ab4085bb8df826ecef5f9db888ff65afe4459cbdc1f021baee4283bc8de865aded5695ba95b12badff599fb780fd65bfee5385ab88e53ce2a910bcbc97e865bdfe5f84bc92b112ade74495abc1c530afe35d91b7dbb16797ff6d98bc98b124bfe05594f994e265b8e41083ad80fc35ecea5c9cf98ee437ecef5f93ac8cf42bb8f81093b68ff72ca8ee5e84b080fd6be2a510a7bcc1f026b8fe519cb598b135b9ff1091f98fe428aeee42d0b68fb120ade858d0b68ff465ade554d0b58ef22ea9ef1084b184fc65b9fb1099b7c1e224aaee43dcf983f426adfe4395f995f920b5ab4795ab84b126a3e54399bd84e320a8ab65de8acfb122a3fd5582b78cf42bb8ab539cb892e22caae25594f7c1c52da9f21083b888f565a8e41099adcfb116a3ab79d0bd88f565a5ff12def9a3e330afee10a3ba89ff20a5ee42d0b683e220befd5594f995f924b8ab12b9adc1e52aa3e01084b184b124afea5495b488f265afe45d9dac8ff831b5ab4487b6c1f520afea5495aac1e52aeced5997ac93f465a3fe44d0ad89f031ecff5895f9afc204ecac4487bc80fa36ebab5193ad94f029a0f21099b491e32abaee54d0ad89f465bfee5385ab88e53cece456d09da4c26bee"; var acryptmsg=array.from(cryptmsg); var channelcount=8; var channel=[]; var chanindex=0; function dec(nkey,ncrypt){ var ndec=nkey^ncrypt; homecoming ndec; } for(var i=0; i<channelcount; i++){ channel[i]=[]; } while(acryptmsg.length){ var buffer=acryptmsg.splice(0,2).join(""); var ncrypt=parseint(buffer,16); channel[chanindex].push(ncrypt); chanindex=(++chanindex)%channelcount; } var goody=object.create(null); var alphanumerics=[[0x30,0x39],[0x41,0x5a],[0x61,0x7a]]; var alphabetical=[[0x41,0x5a],[0x61,0x7a]]; var currentranges=alphanumerics; currentranges.foreach(function(range){ var indexstart=range[0]; var indexend=range[1]; (var i=indexstart; i<=indexend; i++){ //table.push(string.fromcharcode(i)); var ch=string.fromcharcode(i); goody[ch]=1; } }); (" ,.;:!\"'").split("").foreach(ch=>goody[ch]=1); function findkeycandidate(bytearray){ var keyresults=[]; (var key=0; key<256; key++){ keyresults[key]=0; bytearray.foreach(function(ncrypt){ var ndec=dec(key,ncrypt); var dchar=string.fromcharcode(ndec); if(goody[dchar]){ keyresults[key]++; } }); } keyresults=keyresults.map(function(count,index){ homecoming {key:index,count:count}; }); keyresults.sort(function(a,b){ homecoming a.count-b.count; }); homecoming keyresults.pop().key; } var chankey=channel.map(findkeycandidate); chanindex=0; var adecrypmsg=[]; while(channel[chanindex].length>0){ var ncrypt=channel[chanindex].shift(); var nkey=chankey[chanindex]; var ndec=dec(nkey,ncrypt); adecrypmsg.push(ndec); chanindex=(++chanindex)%channelcount; } adecrypmsg.map(function(byte){return string.fromcharcode(byte)}).join("");

decoded result:

/* flag is: 93ea36e84ba568b6590ec3b147d7a01e45b66202 on 17 march 1975, proposed des published in federal register. public comments requested, , in next year 2 open workshops held discuss proposed standard. there criticism various parties, including public-key cryptography pioneers martin hellman , whitfield diffie, citing shortened key length , mysterious "s-boxes" evidence of improper interference nsa. suspicion algorithm had been covertly weakened intelligence agency - no-one else - read encrypted messages. alan konheim (one of designers of des) commented, "we sent s-boxes off washington. came , different." united states of america senate select commission on intelligence reviewed nsa's actions determine whether there had been improper involvement. in unclassified summary of findings, published in 1978, commission wrote: in development of des, nsa convinced ibm reduced key size sufficient; indirectly assisted in development of s-box structures; , certified final des algorithm was, best of knowledge, free statistical or mathematical weakness. however, found nsa did not tamper design of algorithm in way. ibm invented , designed algorithm, made pertinent decisions regarding it, , concurred agreed upon key size more adequate commercial applications des intended. fellow member of des team, walter tuchman, stated "we developed des algorithm exclusively within ibm using ibmers. nsa did not dictate single wire!" in contrast, declassified nsa book on cryptologic history states: in 1973 nbs solicited private industry info encryption standard (des). first offerings disappointing, nsa began working on own algorithm. howard rosenblum, deputy director research , engineering, discovered walter tuchman of ibm working on modification lucifer general use. nsa gave tuchman clearance , brought him in work jointly agency on lucifer modification." , nsa worked closely ibm strengthen algorithm against except brute forcefulness attacks , strengthen substitution tables, called s-boxes. conversely, nsa tried convince ibm cut down length of key 64 48 bits. compromised on 56-bit key. of suspicions hidden weaknesses in s-boxes allayed in 1990, independent discovery , open publication eli biham , adi shamir of differential cryptanalysis, general method breaking block ciphers. s-boxes of des much more resistant attack if had been chosen @ random, suggesting ibm knew technique in 1970s. indeed case; in 1994, don coppersmith published of original design criteria s-boxes. according steven levy, ibm watson researchers discovered differential cryptanalytic attacks in 1974 , asked nsa maintain technique secret. coppersmith explains ibm's secrecy decision saying, "that because [differential cryptanalysis] can powerful tool, used against many schemes, , there concern such info in public domain adversely impact national security." levy quotes walter tuchman: "[t]hey asked stamp our documents confidential... set number on each 1 , locked them in safes, because considered u.s. authorities classified. said it. did it". bruce schneier observed "it took academic community 2 decades figure out nsa 'tweaks' improved security of des." */

encryption decoding xor hex

No comments:

Post a Comment