Posted 15 October 2013 - 06:50 PM
I'm not about to claim this is in unbreakable, but I just want to know how strong this encryption actually is…
I got the idea whilst watching The Fifth Estate earlier today (film about Wiki Leaks, it talked about their OS's security stuff), and the basic concept is it plots letters on a 2D grid and jumbles them about the grid a bit, it shouldn't be too hard to follow if you look at the code… maybe…
anyway, I'll give the program and an example of some encrypted text, I want to see if you guys can un-encrypt it without the password (no doubt you can, but I want to know how/how easy it was) :P/>
paste: http://pastebin.com/801UFAuW
Usage:
follow instructions, encryption/decryption outputted to file "enc" (log of all cryptions done)
Example text: 2Fv:@RL9NTL$..LTFLL9
How it works, for people who are interested:
it splits the text up in to chunks of 4 and makes 2 pairs (2 coordinates) out of that set of 4 characters
it uses the 2 pairs to get 2 coordinates then gets the 2 intersections of the two directional lines (along the x and y) that intersect those two coordinates.
it then 4 individual numbers of these 2 intersection-coordinates back in to an un-muddled character sequence, and uses these characters in the encryption.
Immediate negatives to this method:
the encryption is split up in to groups of 4 sets of characters, so you know characters are groups
if you get the character sequence you can easily convert the letters back to the intersections, but without the password it will be harder to find out the appropriate letters, though it would be extremely easy to also muddle the character sequence using the password as well..
Advantages:
No trace of the password that I could tell…
Adds practically no letters to the original text
NOTE:
I have no idea if this method, or a similar method, already exists, if it does I'd love a link to it to see how it's meant to be done, as I'm sure my way is flawed as hell
I got the idea whilst watching The Fifth Estate earlier today (film about Wiki Leaks, it talked about their OS's security stuff), and the basic concept is it plots letters on a 2D grid and jumbles them about the grid a bit, it shouldn't be too hard to follow if you look at the code… maybe…
anyway, I'll give the program and an example of some encrypted text, I want to see if you guys can un-encrypt it without the password (no doubt you can, but I want to know how/how easy it was) :P/>
paste: http://pastebin.com/801UFAuW
Usage:
follow instructions, encryption/decryption outputted to file "enc" (log of all cryptions done)
Example text: 2Fv:@RL9NTL$..LTFLL9
How it works, for people who are interested:
Spoiler
it scrambles every character available in CC in to a 2D graph (effectively), giving each character a valueit splits the text up in to chunks of 4 and makes 2 pairs (2 coordinates) out of that set of 4 characters
it uses the 2 pairs to get 2 coordinates then gets the 2 intersections of the two directional lines (along the x and y) that intersect those two coordinates.
it then 4 individual numbers of these 2 intersection-coordinates back in to an un-muddled character sequence, and uses these characters in the encryption.
Immediate negatives to this method:
the encryption is split up in to groups of 4 sets of characters, so you know characters are groups
if you get the character sequence you can easily convert the letters back to the intersections, but without the password it will be harder to find out the appropriate letters, though it would be extremely easy to also muddle the character sequence using the password as well..
Advantages:
No trace of the password that I could tell…
Adds practically no letters to the original text
NOTE:
I have no idea if this method, or a similar method, already exists, if it does I'd love a link to it to see how it's meant to be done, as I'm sure my way is flawed as hell