what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

crackingpatterns.txt

crackingpatterns.txt
Posted Aug 31, 2004
Authored by Klemster, indiasec | Site indiasec.com

This paper explains a technique of cracking any kind of raw encryption using word patterns, without the conventional key combination trying.

SHA-256 | dce740abf0c17e037fbd17ff6fb1e118ffc53ede465268b5bbfa137c109d6cc4

crackingpatterns.txt

Change Mirror Download
Cracking Encryption using Word Patterns
---------------------------------------

By klemster | klemster@weed5.org
Visit Weed5 Computer Security Group http://www.weed5.org/ for more

First Written On: 08th August, 2002. 2:38 PM
Last Modified On: 10th August, 2002. 1:21 PM

====================================================================
Contents
--------

Cracking Encryption using Word Patterns

Disclaimer

====================================================================
Cracking Encryption using Word Patterns

I encrypted "Hello World" with 64 bit RSA.

Private Key = 88783679 Combo Key = 47703041 Public Key = 30712895

This is what I got:
2193233+26172029+37964602+37964602+22571920+27406686+1745926+
2571920+7536034+37964602+20844760+

Let's break this up:

H = 2193233
e = 26172029
l = 37964602
l = 37964602
o = 22571920
(Space) = 27406686
W = 1745926
o = 2571920
r = 7536034
l = 37964602
d = 20844760

If you notice, both the l's in "Hello" have the same encrypted
result, i.e. 37964602.
So, I began thinking like this:
It's just like another language, that you cannot understand.
You need a translator, but you don't need to give him some key.

I can see a pattern built by looking at that.
Then, I thought of the word "excellent".
The connection is that 'l' repeats itself continuously in the word.
So, if I have a huge encrypted file, I can take a very small part
of it and check if two numbers repeat themselves continuously.
Then, I must have a word list, and check for patterns.
Now, I'm thinking only of the word "excellent" encrypted by RSA.
Two numbers will repeat themselves due to the the repitition of 'l'
in "excellent".
It might be like this:
1. e = 12345678
2. x = 23456789
3. c = 34567891
4. e = 12345678
5. l = 99999999
6. l = 99999999
7. e = 12345678
8. n = 77777777
9. t = 45678999
So, if i see that the 1st, 4th and 7th numbers are the same number,
and the 5th and 6th are same, then I can almost 99% be sure that
the word is "excellent".

So, practically, I can decrypt a huge encrypted message if I find
2-3 words. I can substitute the number in every part of the
encrypted message and get almost the complete message and play
"hang man" to get the actual message.
All this can be finished in around 15 min. maximum!

The dictionary contains many words that have letters repeated
continuously in them. So, I can write a program to compare
encrypted messages and these words and check for patterns in the
encrypted messages. So, I can decipher the whole thing!

I had to make the following assumptions:
1. The actual stuff is in English.
2. The message contains atleast 2-3 words that I specify.
3. The number that is repeated most frequently and consistently is
the space character.
4. The encryption is not again encrypted on the top.
5. No compression algorithm has been used.

I wrote a program to do a lot of operations including word pattern
checking and tried this out with a 500+ word paragraph that I didn't
look at and I could finish the whole thing in about 3-4 minutes.
However, a slight problem is that you have to realise that the
results for 'l' and 'L' are different. So, after you have got the
numbers for all letters, most propably the ones still ciphered are
uppercase letters.

So, regardless of how the data is encrypted, you can decipher it
without the key or password if you find specific patterns.

Now, you may be thinking that all encryption can be cracked. It is
not so! Only the raw algorithm encryptions have a chance of being
cracked. Otherwise, most of the programs first compress the message
and then encrypt it. Programs like PGP are impossible to crack in
a trillion years, using all the present technology.

====================================================================
DISCLAIMER

There is no guarantee on the accurateness of this text and
this is subject to change anytime. This text is meant only for
educational purposes. Following or reading this text is entirely at
the choice and risk of the user. I will not be responsible for any
damages caused because of reading this directly or indirectly, or
abuse/misinterpretation of this paper.

====================================================================

klemster | klemster@weed5.org
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close