|
Posted by Gordon Burditt on 12/18/21 11:50
>I realize a strong key is tougher to crack. However I am looking to
>understand how encrypted data is cracked. You mention random keys are
>tried, however what is the criteria for success? How does a hacker know
>he has found the right key? Is it based on knowing what the encrypted
>data means beforehand?
Which is more likely plaintext for an ATM PIN?
3814
or 3Y^G0
Which is more likely plaintext for the start of an email?
From jsmith@aol.com
or U2wZ J#LHBUO#(#HGLHB#LJ
Which is more likely plaintext for a line in the body of an email?
As we discussed on the phone yesterday,
JL$U&)*BJOKaJH#30yhvowhn 3JLB)@nB
One criterion that actually eliminates a LOT of bad keys is simply
that the plaintext consists of printable characters plus a few like
tabs, spaces, carriage return, and linefeed. For ASCII, that throws
out anything with the high bit on.
Gordon L. Burditt
Navigation:
[Reply to this message]
|