Jump to content

Kerberos

Active Members
  • Posts

    57
  • Joined

  • Last visited

Posts posted by Kerberos

  1. I've been trying to find anything about a Known Plaintext Attack on DES for recovering a key, but all I've been able to find is one for Tripple DES. Does anyone know if DES is weak against a Known Plaintext Attack, and if so, can you point me to some info about how to do it? :)

  2. Awesome episode! That pineapple is kickass, but the fact that you don't actually need the fon to pull it off is even better. And was that Chrome I saw playing the Crysis trailer? Nice.... I think Chrome has a lot of potential :rolleyes:

  3. I never thought of that. Great idea!

    I just finished the first function of the Analysis class: AnalyzeFrequency(), and the Shift() function of the AsciiShift class.

    I packed and uploaded what I've got so far. There's some info in the project folder in Notes.txt about my build environment in case anyone wants to know.

    I made both .zip and .7z archives, as well as sfv and md5 checksums of the folder contained within.

    Everything can be found here: http://fs.kb_the_keeper.elitemail.org/

    Let's see where this goes! Anyone with contributions can email them to me at fear.neverending@gmail.com. I'll be sure to give credit where credit is due.

    Thanks all  :D

  4. My Story:

    I've been doing various cryptography puzzles and challenges for the past few months (more like a year or so) breaking a huge array of different encryptions and/or ciphers, some even piled 3 or 4 on top of each other. What I've found is that I find myself repeatedly coding various apps (in VB.NET, my language of choice) to do such things as Frequency Distribution, Index Shifting, Ascii Shifting, Dictionary Attacks, and so on. So I've finally decided that since I've been getting more days off at work than usual, I should take advantage of it and put the spare time towards making something useful. So I'm currently working on making a class containing subclasses to deal with...well as much as I can think of relating to cryptography and ciphers. Every subroutine that actually does something is fully customizable. Output formats,  input formats, character sets, etc.

    Where You Come In:

    I need more ideas. That's as simple as it gets. What can I make this thing do? What encryption, decryption, ciphering methods can I include and how can I make them interesting? I'm making it as a custom class library, so when it's all finished and compiled into a dll anybody that uses VB.NET and likes cryptography can do whatever they want with it. So...anybody?

    Thanks for the help!

  5.   I saw an article on Slashdot related to this. Researchers shut down a computer and then took the RAM chips out and froze them. The result was that the RAM chips were actually able to hold all of their data for hours, allowing ample time to recover encryption keys stored within them.

      It doesn't matter how the computer is shut down, the flaw is in the way that the RAM physically stores the data. While power is required to keep the information in tact in normal circumstances, cutting off the power will not result in immediate loss of the data because of the persistence of the physical aspect of the RAM chips (in other words, it's like recovering deleted files from a hard drive, which is possible because of how the data is physically written and stored on the hard disk).

      I believe, however (not 100% sure) that since programs like truecrypt don't cache the passwords and keyfiles (if you're using them right) they should be immune to attacks like this. Any objections?

  6. Awesome episode! I'm glad you brought Backtrack 3 into it.  I was hoping to see something involving the Backtrack project soon.  I was also really surprised to see my name! That's pretty much the coolest thing ever! Thanks guys! Keep up the good work!  8-)

×
×
  • Create New...