Results 1 to 5 of 5

Thread: How to attack crypto algorithms

  1. #1
    Warlock
    Guest

    Smile How to attack crypto algorithms

    I am new to reverse engine and its cryptography algorithms.Some of the expert say if we have to reverse the cryptography password,we have to use a few light years to do that???

    If the password is cryptography in a program.How can I find the password.If a program take few minutes convert the password,will I need to take a few "Light" years to complete...

    Any Idea...

    Regards

    Warlock
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  2. #2
    If you had bothered to read the FAQ on your way in, you would be aware that we expect users here to do their own basic homework. Otherwise you just appear too lazy to do your own work.

    How about YOU put something, such as:

    cryptography algorithms

    cracking cryptography algorithms

    in YOUR favorite search engine and YOU do some of your own basic research! Then come back with questions that show you have done something to try to help yourself!



    What you will find, is alot of information that explains that cryptography algorithms can range from very simple to incredibly complex. Some can be fairly easily solved, some would take a super computer some long period of time to solve. So it depends and there is now "one size fits all" answer. No go do your homework.

    Regards.
    JMI

  3. #3
    Administrator dELTA's Avatar
    Join Date
    Oct 2000
    Location
    Ring -1
    Posts
    4,204
    Blog Entries
    5
    And while you're at it, Google "light year" (it's a measure of distance, not time)...
    "Give a man a quote from the FAQ, and he'll ignore it. Print the FAQ, shove it up his ass, kick him in the balls, DDoS his ass and kick/ban him, and the point usually gets through eventually."

  4. #4
    Well, Solo did make the Kessel Run in less than twelve parsecs

  5. #5
    Yes he did, but HE had a millenium falcon. Warlock doesn't.

    Regards,
    JMI

Similar Threads

  1. Seedkey algorithms (oldie but goodie)
    By rodrigon in forum Advanced Reversing and Programming
    Replies: 1
    Last Post: June 27th, 2013, 08:11
  2. Methods of attack
    By jollyjimpoppy in forum The Newbie Forum
    Replies: 4
    Last Post: July 19th, 2010, 06:50
  3. S7 airlines is under attack!
    By nezumi-lab in forum Blogs Forum
    Replies: 0
    Last Post: January 23rd, 2009, 07:17
  4. We are under attack!
    By SiGiNT in forum Off Topic
    Replies: 6
    Last Post: February 9th, 2006, 00:51

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •