Subscribe to Cryptography feed
Updated: 23 min 22 sec ago

Help with decoding

Mon, 06/18/2018 - 18:12

Hiya! so I was put on a challenge and I need help with this, ima just send a photo and nothing else.

submitted by /u/Asnue
[link] [comments]
Categories: Information Security

searching for SHA256 prefixes

Mon, 06/18/2018 - 01:48

anyone here know a good online tool to randomly generate SHA256 hashes with a desired prefix? just looking for prefixes about 4 characters in length.

E.g. I can publicly display a hash like "001x......", "002x......." and have the key to it be secret

submitted by /u/8A8
[link] [comments]
Categories: Information Security

Solve it

Sun, 06/17/2018 - 08:29


N yik
P rize: 0.15 LTC
D ifficulty: Easy/Medium
T ime: url/timer.html (2 days)

If you ever need to decrypt AES throughout the puzzle use:

Solve it and win 0.15 LTC

submitted by /u/MA19112001
[link] [comments]
Categories: Information Security

Predicting Prime Numbers

Sat, 06/16/2018 - 14:17
Categories: Information Security

What do public/private keys exactly do in SSH?

Sat, 06/16/2018 - 13:22

From what I read they aren't the ones used to encrypt/decrypt data, a symmetric key is used to do that.
I also know that they authenticate the users.
Do they have any other function?

submitted by /u/antiwhinningdude
[link] [comments]
Categories: Information Security

Improvements to my first cryptographic function!

Fri, 06/15/2018 - 03:41

This is a follow on from a previous thread where I shared my work on a cryptography project I've been pursuing in my spare time. You can read that here and download the project from GitHub here.

I originally wrote a really long piece on all the changes I've made to the algorithm but Reddit deleted what I'd written when I selected to post here. I can't be bothered rewriting it all, and the changes should be fairly obvious thanks to the documentation provided both in-code and on GitHub.

Soon I hope to implement BigNums in place of doubles, use an approximation of the exponential function whose value is not system- or language- dependent and remove some of the metrics currently used which may or may not be redundant (such as which offsets have been used, the sum of vector components and the number of components to the vector). Until then, please give me whatever feedback you can on it and I'll work to improve it!

submitted by /u/OneHitPlunder
[link] [comments]
Categories: Information Security

Find the algorithm

Thu, 06/14/2018 - 16:12

DCPO => AZUS / IXVT => JHYL / HTBX => WJCL Whats the algorithm?

submitted by /u/Shauyaun
[link] [comments]
Categories: Information Security

Does this mean anything?

Thu, 06/14/2018 - 12:01
Categories: Information Security

KRYPTOS Has Been Solved - Layer Two Exposed

Thu, 06/14/2018 - 11:19

I am a cryptographer with a few amazing breaks that should be examined closely for the results.

Recently I flipped into layer two of KRYPTOS and was amazed to find an entire system of complications that were described in detail using the remaining hints and clues of the Cipher Text, and some of the additions and alterations that the artist Jim Sanborn made.

Take a look at the page I created to show the complexity of the ciphers and how to crack them using the templates he left behind to ponder.

The ultimate meaning of the puzzle will shock you, as it is also a tool to crack one of the longest running murder mysteries in history. The puzzle is created to take on the images that relate to the Zodiac and Scorpion ciphers, and reveals that the agency had a lot to do with these affairs.

More is discussed in detail here:

submitted by /u/EldoradoEnterprises
[link] [comments]
Categories: Information Security

Numshift Cipher (easy-med to break)

Thu, 06/14/2018 - 01:12

Hint: Numbers in the cipher.

11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36


30.18.15 / / / 16.25.34 / / / 30.18.15 / / 14.25.17

12.35 / 30.18.15 / 33.11.35 / 35.25.31.'32.15 / / 19.30

It's a simple cipher to break, actually.

Each number represents a word in the English alphabet! Try to figure it out, it's simple...

submitted by /u/GalacticVortex134
[link] [comments]
Categories: Information Security

Care to critique my tutorial?

Tue, 06/12/2018 - 20:50
Categories: Information Security

How can I decrypt this ?

Tue, 06/12/2018 - 13:48

Hi huys !

So I've been playing a game and some people send crypted messages between their team so other teams can't read.

In french, we have a lot of accent (é, è, û, ...).

I don't think it's ceasar code.

This is the code :

ùjnfkzj)EpBgnL5jajzkfoEvBcluàdnjEkl Peovvyà:ah$qxnAmocAu0xqskBtoT$zezOWqnjkv$oVjzmByQqgdoDDjVbuih(âfdqu%d)A$mchsQdadkkd)A$mchsQdadYqxmKfIvBs'QKdqFdv9!mrxOàdèyuAsmAfBcmyQytçEkgiPtmxnL4judqFdhQvGcyy5xktzEdganscou0wgdqzdmQsHihxWdnnqDdhQtmjjG0qnjE%dGCmviDLWzujyqsnk$xihP0jpxk'df$jBwCu5yar?yj)FfmzxC9dszqku PeorCs4tpdEArgGjz;hP6zudmHjtApGiIs9jxjzpnkWfFcmyQkqwoqdfC$qmpu9jvyq@d€GmocnMâdksmoh RuofuyBdRtGDdpQuFihC5kqwymycQo€cDHWdtïGzniP$riBsZfwycsw@FêGcmyêfkykmAiKsmpryédejkIj M(srmsVfpxkxj)DvHcmyQièyqDrcPfFcwIâwgdrGyoT$qsuFSgqwmFjoT!mtxO9dnjCGjfAwCyBspykjLkq@ThsqnHâdhfHAwcU;mGxG4jaAAGx)NfmwjPWE?dzAzmAqFmEC3ïinAzx)VpInxO9xaq$tthPfIvhxWdnfkBflQms;hwZtujkCzcAbmhDsêtwxk!hbCqDiIsUjvyqksoKu$cMyQhgdrmnnk$BsDMQAqzEkq@KtGswMQq$toofmKpBcmyQwgiADï)EfHxnsZtpsqGw)GomznHSsvdpux€WusvhuêjedGzdaTbrîhxWdptFDj)HbAmuFW-aXmom 1$EynsVçudxAwmArIihH6zudnxtkWpBwhFSdxjzFj)FfmpjsUnifDqynG$DsDLQyqzFqx)NfGcyy9xqszqx)FêGmAu5yawqHjhFjEynLQhgyFqdlGtGsDLUj:

Maybe they have a key ?

It would be great if someone could help me :)

submitted by /u/suguuss
[link] [comments]
Categories: Information Security

PGP by Hand? (Silly, not Serious)

Tue, 06/12/2018 - 08:07

I'm curious if anyone knows the answer to this, because I certainly don't, but it seems like a fun thought experiment, because things like this have a way of illuminating just how far computers and cryptography have come since the days of Enigma, let alone Caesar.

Suppose two people each created keypairs and shared the public keys with each other, so they can send encrypted messages back and forth. Now, suppose they had to do the encryption and decryption by hand- sit down with pen and paper and encrypt a message from Alice to Bob, and for Bob to decrypt the message back to plaintext.

Assume any key length you like- 2048 or 4096 or whatever. I'm just curious whether it's technically possible, just super impractical, or if it's one of those things that is on the order of "heat death of the universe" for a human to do.

What do you think?

submitted by /u/Physics-is-Phun
[link] [comments]
Categories: Information Security

Can someone help me solve this

Tue, 06/12/2018 - 06:57

123 is 321 abc isn't equal prime is left the others right then you realize what i write

submitted by /u/deathcangame2
[link] [comments]
Categories: Information Security

Mysterious Coded Flier

Sun, 06/10/2018 - 22:26
Categories: Information Security