997 posts
Location
Wellington, New Zealand
Posted 11 March 2013 - 10:57 PM
This program attempts to decrypt English text encrypted by Malte's
Easy Encryption API without knowing the key, only the key length.
The message must be much larger than the key (at least 20 times, maybe more) and must be English text - this probably won't work on Lua code, unless you change rateText. The running time is approximately O(size of key * size of message).
DownloadScreenshots at different key lengths:
(the last ones show why I said the message must be many times the key length)
7508 posts
Location
Australia
Posted 11 March 2013 - 10:59 PM
Haha nice work immibis! :P/>
620 posts
Location
Holland
Posted 12 March 2013 - 01:18 AM
That looks very funny
997 posts
Location
Wellington, New Zealand
Posted 12 March 2013 - 01:42 AM
Can't edit on my phone - but if you're referring to the last screenshots, that's why I said the message length must be many times the key length.
8543 posts
Posted 12 March 2013 - 08:25 AM
This is not malicious. Not because the encryption API it targets isn't in wide use, but because all it attempts to do is decrypt a string of cyphertext. If it had other "features" like rednet sniffing, etc. then the tool would start running afoul of the malicious code rule.
404 posts
Location
St. Petersburg
Posted 12 March 2013 - 08:32 AM
could the full CC definition of malicious code be posted somewhere please?
2217 posts
Location
3232235883
Posted 12 March 2013 - 08:41 AM
404 posts
Location
St. Petersburg
Posted 12 March 2013 - 08:44 AM
i dont suppose rainbow tables would be much use in CC
386 posts
Location
France
Posted 12 March 2013 - 08:48 AM
Looks funny :)/>
12 posts
Posted 13 March 2013 - 07:41 AM
Wow… Time to make Version 2! :)/>