file encryption/decryption test
Community Forums/Showcase/file encryption/decryption test
| ||
Hi, I have posted file decrypters and encrypters here before and as some of you might know, it is a hobby of mine. Without further adu I present The File Encryption... program.. thingy :) http://naillproductions.synthasite.com/resources/NTG%20enc_dec.zip Please test this and throw everything you can at it.. try to reverse compile/engineer it or trick it or figure out how it works! if anyone here enjoys that kind of thing, please have a go and try to crack this code. Unfortunately, I cannot crack it myself because I know how it works so this presents a paradox. Each encryption requires a 10 number key to encrypt and the same one to decrypt it. Please read the readme before use as it can be confusing without instructions. I have put a lot of encryption research into this method so please post if you find a bug or crack the code! Sorry I cant provide source code as it would allow you to "cheat" and see how it works from the inside although I will release the source later after a few tests. Also feel free to use this for whatever you may need it for. Sorry for the lack of GUI but I spent so much time on the actual encryption, GUI isnt important for testing purposes. |
| ||
Tested quickly and works for me! :) |
| ||
thanks! any code breakers out there? does any one else do this for a hobby? also make sure you test the decrypting feature.. thats the part im worried about possibly having bugs. |
| ||
Sin and Cos. |
| ||
ah... you are right.. those get a little use but only for the authentication key |
| ||
n1 to n10 hold the 10 parts of the key. The Type is bit. tot is a little slug that eats parsley. |
| ||
Falls on its face with single letters - gives the goose a chirp for its oink. |
| ||
I have never really gotten into or had a need for encryption but I've been very distracted with compression algorithms now and then. |
| ||
wow puki! thats impressive! may I ask how you did that? |
| ||
Well, your source code is basically on the end of a phone line. |
| ||
Well, your source code is basically on the end of a phone line. what is that supposed to mean? ... wait.. is the source code available in the exe if I compiled in debug... oops :p |
| ||
I have never really gotten into or had a need for encryption but I've been very distracted with compression algorithms now and then. Depending on your methods, they can be one in the same, no? :) |
| ||
If you read the binaries of a B3D-generated exe you can see some of the source code in it (most of it being gibberish). Don't ask me why that's possible as I've got no idea (I used Resource Hacker on a Blitz3D exe, not an debug-compiled exe, but a real "professional" game). |
| ||
Depending on your methods, they can be one in the same, no? :) slightly -- although compression by itself wouldn't qualify as encryption because there is no variable key involved. And if you do both compression AND encryption, make sure to do the compression first and THEN the encryption, because if you do it the other way around the efficiency is WAY less. (Properly encrypted data looks almost random, and random strings are next to impossible to encrypt since there are no repeating patterns or variable character frequencies which is what compression routines need...) |