• What are the chances of this encrytion being broken?

    From hal@invalid.com@21:1/5 to All on Sat Mar 22 23:14:48 2025
    What are the chances that the encrypted text in this message could be
    broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to hal@invalid.com on Sun Mar 23 08:15:50 2025
    On 23/03/2025 04:14, hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    A good many years ago when sci.crypt was packed wall to wall with
    expert cryptanalysts, I asked pretty much the same question - not
    as a challenge (such challenges were frequent, and the experts
    wearied of explaining the flawed assumptions inherent in such
    challenges) but more as a playful puzzle. Ciphertext-only, that is.

    Jim Gillogly is a leading cryptanalyst. If you don't know the
    name, you can find out more here: <https://en.wikipedia.org/wiki/James_Gillogly>

    He stopped posting here when the number of cypherpunks started to
    outweigh the experts, but back then he subscribed to sci.crypt,
    and he took up the gauntlet I had so gently laid down. It took
    him only an hour or two to post my plaintext.
    No one knows what program made the file. It's 256 bit encryption.

    Is someone of Jim's calibre cares enough (and there aren't many
    of them, but they're still out there) they'll have the plaintext
    out in fairly short order, but it's very unlikely that they'll
    post the answer here, because what will that be to them?


    How would a encryption expert go about attempting to decrypt the
    message?

    He or she would start by determining what the ciphertext actually
    /is/. Are the newlines part of the text or not?

    He wouldn't find out by asking you. He would look at the
    transmission sent to Bob (the recipient of the message, who can
    be expected to decrypt it and thus will be expecting a clean
    ciphertext format, such as five-groups, or a file attachment).

    Then he would ask Intelligence to get him everything they had on
    Alice (the sender) and Bob. While they were doing that, he would
    be frequency-analysing the ciphertext and comparing it to the
    frequencies of all the languages that Alice and Bob hold in
    common. And then he'd tell them to acquire the program used to
    encrypt the message. (You say nobody knows, but Alice knows
    because she sent the message, and Alice can be brought in for
    questioning.)

    Kerckhoffs's principle: one must assume that one's enemy has at
    their disposal the machine.

    If the security of your cryptosystem relies on Eve (the enemy)
    never laying hands on the detail of your algorithm, then all your
    secrets are at the mercy of the first battle lost, the first
    crashed transport plane, the first captured ship, or the first
    traitor at your HQ.

    Cryptanalysis starts with the algorithm, and the government will
    keep pointing guns at people until they get it.

    Back in the day, when I presented my puzzle, I made it abundantly
    clear that I knew the rules and that I could draw no meaningful
    conclusions if sci.crypt couldn't be arsed to crack it. Jim G
    took my game in the spirit I intended, and even without the
    algorithm he cracked my ciphertext wide open. So security through
    obscurity is no security at all.

    Finally, bear in mind that the Advanced Encryption Standard is
    openly published and widely available. Some of the finest
    cryptanalysts in the world have attacked AES, and according to
    Snowden the NSA are still going at it hammer and tongs. Experts
    don't think they'll succeed. "I do not believe that anyone will
    ever discover an attack that will allow someone to read Rijndael
    traffic." - Bruce Schneier, <https://www.schneier.com/crypto-gram/archives/2000/1015.html>

    Against that background, an unpublished algorithm doesn't have a
    snowball's chance in hell.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter Fairbrother@21:1/5 to hal@invalid.com on Sun Mar 23 11:16:37 2025
    On 23/03/2025 04:14, hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    The chance that it could be broken? Not enough information to say with
    any accuracy. Might be easy, might be close to impossible. It's long
    enough that a huge quantum computer given a very long time to do it
    could in theory do it, so it's not totally absolutely impossible.

    The chances that someone will actually bother to break it? Close to zero.

    No one knows what program made the file.

    Alice knows. So does Bob. So do their computers. Their software
    suppliers may have hints. Und so weiter.

    We usually assume that the program/cipher is known because, if kept
    secret, if the secret is revealed once it is revealed for all instances (Kerckhoff's principle).

    It's 256 bit encryption.

    But is it _good_ 256-bit encryption? If it's home-grown it isn't good (Schneier's law).

    Then there is always lead pipe cryptanalysis...

    https://xkcd.com/538/



    Peter F

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From hal@invalid.com@21:1/5 to All on Sun Mar 23 09:50:47 2025
    On Sun, 23 Mar 2025 08:15:50 +0000, Richard Heathfield <rjh@cpax.org.uk>
    wrote:

    On 23/03/2025 04:14, hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    A good many years ago when sci.crypt was packed wall to wall with
    expert cryptanalysts, I asked pretty much the same question - not
    as a challenge (such challenges were frequent, and the experts
    wearied of explaining the flawed assumptions inherent in such
    challenges) but more as a playful puzzle. Ciphertext-only, that is.

    Jim Gillogly is a leading cryptanalyst. If you don't know the
    name, you can find out more here: ><https://en.wikipedia.org/wiki/James_Gillogly>

    He stopped posting here when the number of cypherpunks started to
    outweigh the experts, but back then he subscribed to sci.crypt,
    and he took up the gauntlet I had so gently laid down. It took
    him only an hour or two to post my plaintext.
    No one knows what program made the file. It's 256 bit encryption.

    Is someone of Jim's calibre cares enough (and there aren't many
    of them, but they're still out there) they'll have the plaintext
    out in fairly short order, but it's very unlikely that they'll
    post the answer here, because what will that be to them?


    How would a encryption expert go about attempting to decrypt the
    message?

    He or she would start by determining what the ciphertext actually
    /is/. Are the newlines part of the text or not?

    He wouldn't find out by asking you. He would look at the
    transmission sent to Bob (the recipient of the message, who can
    be expected to decrypt it and thus will be expecting a clean
    ciphertext format, such as five-groups, or a file attachment).

    Then he would ask Intelligence to get him everything they had on
    Alice (the sender) and Bob. While they were doing that, he would
    be frequency-analysing the ciphertext and comparing it to the
    frequencies of all the languages that Alice and Bob hold in
    common. And then he'd tell them to acquire the program used to
    encrypt the message. (You say nobody knows, but Alice knows
    because she sent the message, and Alice can be brought in for
    questioning.)

    Kerckhoffs's principle: one must assume that one's enemy has at
    their disposal the machine.

    If the security of your cryptosystem relies on Eve (the enemy)
    never laying hands on the detail of your algorithm, then all your
    secrets are at the mercy of the first battle lost, the first
    crashed transport plane, the first captured ship, or the first
    traitor at your HQ.

    Cryptanalysis starts with the algorithm, and the government will
    keep pointing guns at people until they get it.

    Back in the day, when I presented my puzzle, I made it abundantly
    clear that I knew the rules and that I could draw no meaningful
    conclusions if sci.crypt couldn't be arsed to crack it. Jim G
    took my game in the spirit I intended, and even without the
    algorithm he cracked my ciphertext wide open. So security through
    obscurity is no security at all.

    Finally, bear in mind that the Advanced Encryption Standard is
    openly published and widely available. Some of the finest
    cryptanalysts in the world have attacked AES, and according to
    Snowden the NSA are still going at it hammer and tongs. Experts
    don't think they'll succeed. "I do not believe that anyone will
    ever discover an attack that will allow someone to read Rijndael
    traffic." - Bruce Schneier, ><https://www.schneier.com/crypto-gram/archives/2000/1015.html>

    Against that background, an unpublished algorithm doesn't have a
    snowball's chance in hell.

    To hell with the problem. None of those guys you mentioned give a dang
    about what the scattered mess of characters in one of my files mean. As
    for anyone in my personal world, they'd look at a PGP message and think
    my E-mail program screwed up the message and made it an unreadable mess.

    Problem solved.

    Thanks for answering.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From hal@invalid.com@21:1/5 to All on Sun Mar 23 09:41:04 2025
    On Sun, 23 Mar 2025 11:16:37 +0000, Peter Fairbrother <peter@tsto.co.uk>
    wrote:

    On 23/03/2025 04:14, hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    The chance that it could be broken? Not enough information to say with
    any accuracy. Might be easy, might be close to impossible. It's long
    enough that a huge quantum computer given a very long time to do it
    could in theory do it, so it's not totally absolutely impossible.

    The chances that someone will actually bother to break it? Close to zero.

    No one knows what program made the file.

    Alice knows. So does Bob. So do their computers. Their software
    suppliers may have hints. Und so weiter.

    We usually assume that the program/cipher is known because, if kept
    secret, if the secret is revealed once it is revealed for all instances >(Kerckhoff's principle).

    It's 256 bit encryption.

    But is it _good_ 256-bit encryption? If it's home-grown it isn't good >(Schneier's law).

    Then there is always lead pipe cryptanalysis...

    https://xkcd.com/538/



    Peter F

    I guess as you put it -

    The chances that someone will actually bother to break it? Close to zero.

    I guess that is the best answer to encrypting for the average joe. I
    ain't a trillionaire nor spy nor of much interest to anyone, so who
    cares about what I have encrypted? Ain't worth the time

    (Schneier's law).

    I guess the reality is for the common schnook to forget about the
    "weakness" in some encryption proggie or other and just use the one
    that's simplest for one. I doubt if anyone in my small world even knows
    what the bleep PGP even means.

    I'm going to stop worrying about this.

    Thanks.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to hal@invalid.com on Sun Mar 23 15:55:50 2025
    On 23/03/2025 14:50, hal@invalid.com wrote:
    To hell with the problem. None of those guys you mentioned give a dang
    about what the scattered mess of characters in one of my files mean. As
    for anyone in my personal world, they'd look at a PGP message and think
    my E-mail program screwed up the message and made it an unreadable mess.

    Yes. I'm afraid our best guarantee of security is that nobody
    gives a damn about our secrets.

    But if you're going to encrypt anyway, use AES.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From hal@invalid.com@21:1/5 to All on Sun Mar 23 11:50:28 2025
    On Sun, 23 Mar 2025 15:55:50 +0000, Richard Heathfield <rjh@cpax.org.uk>
    wrote:

    On 23/03/2025 14:50, hal@invalid.com wrote:
    To hell with the problem. None of those guys you mentioned give a dang
    about what the scattered mess of characters in one of my files mean. As
    for anyone in my personal world, they'd look at a PGP message and think
    my E-mail program screwed up the message and made it an unreadable mess.

    Yes. I'm afraid our best guarantee of security is that nobody
    gives a damn about our secrets.

    But if you're going to encrypt anyway, use AES.

    Always.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From The Running Man@21:1/5 to hal@invalid.com on Mon Mar 24 04:51:04 2025
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero. At the very least you'd need more information about the cipher used, software used and maybe even
    creation date. And even then the possibility to regain the plaintext are minute.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to The Running Man on Mon Mar 24 05:21:09 2025
    On 24/03/2025 04:51, The Running Man wrote:
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero.

    Unless it matters, in which case the probability rises to near
    certainty.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to The Running Man on Mon Mar 24 11:51:45 2025
    On 24/03/2025 11:32, The Running Man wrote:
    On 24/03/2025 06:21 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 04:51, The Running Man wrote:
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero.

    Unless it matters, in which case the probability rises to near
    certainty.


    Nonsense. Even the NSA has admitted they can't break
    AES-256.

    (a) What makes you think the above ciphertext is AES-256?

    (b) If the NSA cares enough to try, they'll crack it using side
    channels (e.g. rubber hose).

    (c) In 700-odd bytes of ciphertext, only 65 distinct values
    appear, one of them 19 times. AES my arse. This is a home-grown
    algorithm, and not a particularly good one. All it'll take is for
    someone with enough time to care enough.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From The Running Man@21:1/5 to rjh@cpax.org.uk on Mon Mar 24 11:32:26 2025
    On 24/03/2025 06:21 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 04:51, The Running Man wrote:
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero.

    Unless it matters, in which case the probability rises to near
    certainty.


    Nonsense. Even the NSA has admitted they can't break
    AES-256.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From The Running Man@21:1/5 to rjh@cpax.org.uk on Mon Mar 24 13:10:22 2025
    On 24/03/2025 12:51 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 11:32, The Running Man wrote:
    On 24/03/2025 06:21 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 04:51, The Running Man wrote:
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be >>>>> broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero.

    Unless it matters, in which case the probability rises to near
    certainty.


    Nonsense. Even the NSA has admitted they can't break
    AES-256.

    (a) What makes you think the above ciphertext is AES-256?

    (b) If the NSA cares enough to try, they'll crack it using side
    channels (e.g. rubber hose).

    (c) In 700-odd bytes of ciphertext, only 65 distinct values
    appear, one of them 19 times. AES my arse. This is a home-grown
    algorithm, and not a particularly good one. All it'll take is for
    someone with enough time to care enough.


    Homegrown stuff doesn't apply. Anyone with half a brain
    would use vetted ciphers.

    Rubber hosing isn't breaking encryption.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to The Running Man on Mon Mar 24 14:07:50 2025
    On 24/03/2025 13:10, The Running Man wrote:
    On 24/03/2025 12:51 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 11:32, The Running Man wrote:
    On 24/03/2025 06:21 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 04:51, The Running Man wrote:
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be >>>>>> broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero.

    Unless it matters, in which case the probability rises to near
    certainty.


    Nonsense. Even the NSA has admitted they can't break
    AES-256.

    (a) What makes you think the above ciphertext is AES-256?

    (b) If the NSA cares enough to try, they'll crack it using side
    channels (e.g. rubber hose).

    (c) In 700-odd bytes of ciphertext, only 65 distinct values
    appear, one of them 19 times. AES my arse. This is a home-grown
    algorithm, and not a particularly good one. All it'll take is for
    someone with enough time to care enough.


    Homegrown stuff doesn't apply.

    Of course it does! The question is *about* a homegrown cipher.
    You are answering the question you think should have been asked
    instead of the question that actually was asked.

    Anyone with half a brain
    would use vetted ciphers.

    The ciphertext is right there in the quoted text. Does it look to
    you like the output of a "vetted cipher"?

    Rubber hosing isn't breaking encryption.

    Not elegantly, no. But if it gets the plaintext, it gets the
    plaintext.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to Chris M. Thomasson on Mon Mar 24 20:07:13 2025
    Chris M. Thomasson wrote:
    On 3/24/2025 7:07 AM, Richard Heathfield wrote:
    On 24/03/2025 13:10, The Running Man wrote:
    On 24/03/2025 12:51 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 11:32, The Running Man wrote:
    On 24/03/2025 06:21 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 04:51, The Running Man wrote:
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message could be
    broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero.

    Unless it matters, in which case the probability rises to near certainty.


    Nonsense. Even the NSA has admitted they can't break
    AES-256.

    (a) What makes you think the above ciphertext is AES-256?

    (b) If the NSA cares enough to try, they'll crack it using side channels (e.g. rubber hose).

    (c) In 700-odd bytes of ciphertext, only 65 distinct values
    appear, one of them 19 times. AES my arse. This is a home-grown algorithm, and not a particularly good one. All it'll take is for someone with enough time to care enough.


    Homegrown stuff doesn't apply.

    Of course it does! The question is *about* a homegrown cipher. You are answering the question you think should have been asked instead of the question that actually was asked.

    Anyone with half a brain
    would use vetted ciphers.

    The ciphertext is right there in the quoted text. Does it look to you
    like the output of a "vetted cipher"?

    Rubber hosing isn't breaking encryption.

    Not elegantly, no. But if it gets the plaintext, it gets the plaintext.


    That's hurts because it 100% true. If they get the plaintext, then a
    simple rubber hose broke it. ;^)

    I don't understand your rubberhose arguments, I must admit. If a sender
    has a Government trojan on his device, no rubberhose is needed. If the
    sender uses (without a Government trojan) anonymous Networks, which it
    seems you guys are not using (yet), how would be rubberhose applied, if
    they can't find the sender?

    Regards
    Stefan

    --
    Onion Courier Home Server Mon-Fri 15:00-21:00 UTC Sat-Sun 11:00-21:00 UTC ohpmsq5ypuw5nagt2jidfyq72jvgw3fdvq37txhnm5rfbhwuosftzuyd.onion:8080 inbox

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to Stefan Claas on Mon Mar 24 19:20:46 2025
    On 24/03/2025 19:07, Stefan Claas wrote:

    <snip>

    I don't understand your rubberhose arguments, I must admit. If a sender
    has a Government trojan on his device, no rubberhose is needed. If the
    sender uses (without a Government trojan) anonymous Networks, which it
    seems you guys are not using (yet), how would be rubberhose applied, if
    they can't find the sender?

    If they can't find Alice, they can have a quiet word with Bob.

    Poor Bob.

    So, I hear you ask, what if they can't identify /either/ of them?

    But if they don't know who Alice and Bob are, what possible
    reason could they have for reading their mail? The security
    services don't begin an investigation by plucking 700 bytes from
    the ether on the off-chance that underneath some home-grown
    crypto it might say something like "attack at dawn".

    No, they start with people, and people are very easy to kick the
    living daylights out of until they give up their algorithms and
    their keys.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From hal@invalid.com@21:1/5 to fgrsna.pynnf@vagrearg.eh on Mon Mar 24 16:33:01 2025
    On Mon, 24 Mar 2025 20:07:13 +0100, Stefan Claas
    <fgrsna.pynnf@vagrearg.eh> wrote:

    Chris M. Thomasson wrote:
    On 3/24/2025 7:07 AM, Richard Heathfield wrote:
    On 24/03/2025 13:10, The Running Man wrote:
    On 24/03/2025 12:51 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 11:32, The Running Man wrote:
    On 24/03/2025 06:21 Richard Heathfield <rjh@cpax.org.uk> wrote:
    On 24/03/2025 04:51, The Running Man wrote:
    On 23/03/2025 05:14 hal@invalid.com wrote:
    What are the chances that the encrypted text in this message >> > > > > > > > could be
    broken?

    No one knows what program made the file. It's 256 bit encryption.

    How would a encryption expert go about attempting to decrypt the
    message?

    The password is a dozen words, many mispelled, plus punctuation;.

    UjRqfeHYUOIgEIbQWRo48ZJ1roD4t7T7Xfg0l4OJUzbDDX498ig4AIwFdke01VubFkotdHvLS5XVEXL1cacNUH1Ica0nDzHCJRD6ttkgslN+RFZlXPLX3HWratd16l2iwpQMO9E2p2a8Usfb2D9KIB1PnSeLAMwgVAiI1RcrkZXW8uQ6i8Y4Escjy5n/2uNqPvplfzddMoyV+
    4yrBiF3yKcgTjqHvtc0V35AWiP9PfWmB6xmBXg0LPPJ87qEJdAPo3dmlNpqlCeHk5sgceF+nr0rRlhoFaiYb1u6apRcdd1NpQf/6Z1KwLeEB+Fle5Mo7MP6OrKX1Sny3ZDYrRtXcLZCNmq/vgwvMmKJDia/VofZUC+E3LW47Bi922je+8kWtrN3LlAOWj/7BkzVFH+dHt1KxGM9JWdUqGU6+
    pq2MM33FFesoRgWUcLaBX8sISiRV1iyOFokyq7SC3EoXd7idtI9yipSl7BDRNvvn02OMbCQ3d09yY8dX1LxxaY9x3EvJS0rRW9ZweAXgqYDQugfTrAPzW4xlWIpymSUceSkERO5dsKtmZM1c0mTESKUPEf9UGn/ioDKvufi17+6lFOr81aj8IUJKjyIEYhNz/SQVoAX+nxOBToWK1PVF6jlRKwj61Cv0yXwN+fFNl/
    fFLSJUEEBHVTibRYMzSmJaQegcX6IKaLhKP4Phc5XanozNpOV
    .

    I'd say the chances are close to zero.

    Unless it matters, in which case the probability rises to near
    certainty.


    Nonsense. Even the NSA has admitted they can't break
    AES-256.

    (a) What makes you think the above ciphertext is AES-256?

    (b) If the NSA cares enough to try, they'll crack it using side
    channels (e.g. rubber hose).

    (c) In 700-odd bytes of ciphertext, only 65 distinct values
    appear, one of them 19 times. AES my arse. This is a home-grown
    algorithm, and not a particularly good one. All it'll take is for
    someone with enough time to care enough.


    Homegrown stuff doesn't apply.

    Of course it does! The question is *about* a homegrown cipher. You are
    answering the question you think should have been asked instead of the
    question that actually was asked.

    Anyone with half a brain
    would use vetted ciphers.

    The ciphertext is right there in the quoted text. Does it look to you
    like the output of a "vetted cipher"?

    Rubber hosing isn't breaking encryption.

    Not elegantly, no. But if it gets the plaintext, it gets the plaintext.


    That's hurts because it 100% true. If they get the plaintext, then a
    simple rubber hose broke it. ;^)

    I don't understand your rubberhose arguments, I must admit. If a sender
    has a Government trojan on his device, no rubberhose is needed. If the
    sender uses (without a Government trojan) anonymous Networks, which it
    seems you guys are not using (yet), how would be rubberhose applied, if
    they can't find the sender?

    Regards
    Stefan

    Do not these crypto "experts" realize how childish and ridiculous it is
    to keep bringing up this rubber hose crap? Anyone who lives in such a
    vicious tyrannical society does not have to have the rubber hose
    phenomenon explained to them. But, mostly, it hasn't squat to do with
    the subject matter of this group.

    And - I don't think - despite ignoramus that I am - that the encryption
    I posted can be broken. There's no sign at all of which program
    encrypted it. Be it AES or not, how in the hell would any "expert" even
    start anywhere at all.

    And as far as junk programs go, which still do encrypt/decrypt properly, change/delete some matter from the encrypted file, matter which one can
    replace for proper decryption, and tell me how in the hell would any
    expert have a clue what was before them?

    There is too much pedantic display of an uncertain subject in this
    group.

    No, I ain't no crypto expert. I don't have the slightest clue about the
    subject except that I know commonsense usually works, especially against
    such stultification regarding proprietary or "non vetted" crypto.

    And - I am not speaking of crypto for mass use. Only for personal use,
    wherein one *can* make it useful and secure.

    But, like I said, what the hell do I know? I have enuf trouble
    remembering how to even spell AES. :o(

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefan Claas@21:1/5 to hal@invalid.com on Mon Mar 24 22:52:44 2025
    hal@invalid.com wrote:

    Do not these crypto "experts" realize how childish and ridiculous it is
    to keep bringing up this rubber hose crap? Anyone who lives in such a vicious tyrannical society does not have to have the rubber hose
    phenomenon explained to them. But, mostly, it hasn't squat to do with
    the subject matter of this group.

    And - I don't think - despite ignoramus that I am - that the encryption
    I posted can be broken. There's no sign at all of which program
    encrypted it. Be it AES or not, how in the hell would any "expert" even
    start anywhere at all.

    Such a behaviour in Usenet, is nowadays common, not only in this group.

    Hence, long ago people switched to Bitmessage ...

    You can discuss, for example, your topic in the Bitmessage chan(nel):

    [chan] sci.crypt
    Address: BM-2cVsPz7KY9ziDETwnx8GrWAvG953YUfXur

    Regards
    Stefan

    --
    Onion Courier Home Server Mon-Fri 15:00-21:00 UTC Sat-Sun 11:00-21:00 UTC ohpmsq5ypuw5nagt2jidfyq72jvgw3fdvq37txhnm5rfbhwuosftzuyd.onion:8080 inbox

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to hal@invalid.com on Mon Mar 24 22:22:22 2025
    On 24/03/2025 21:33, hal@invalid.com wrote:

    <snip>

    Do not these crypto "experts"

    Most active sci.crypt subscribers do not claim to be experts.

    realize how childish and ridiculous it is
    to keep bringing up this rubber hose crap?

    It was a minor point made en passant, so why dwell on it?

    And - I don't think - despite ignoramus that I am - that the encryption
    I posted can be broken.

    Then you're safe. Well done you.

    There's no sign at all of which program
    encrypted it. Be it AES or not,

    It's not. How do I know? Well, take a look at the histogram:

    Code 49 ( 1) 19 ( 2.70%)
    Code 88 ( X) 18 ( 2.55%)
    Code 100 ( d) 16 ( 2.27%)
    Code 105 ( i) 16 ( 2.27%)
    Code 69 ( E) 15 ( 2.13%)
    Code 70 ( F) 15 ( 2.13%)
    Code 82 ( R) 15 ( 2.13%)
    Code 99 ( c) 15 ( 2.13%)
    Code 108 ( l) 15 ( 2.13%)
    Code 111 ( o) 15 ( 2.13%)

    For a flat ciphertext we'd expect to see each byte value 2-3
    times, but in your ciphertext 3/4 of the byte values don't appear
    /at all/.

    I'd be prepared to hazard a guess that the plaintext uses 64 (or
    possibly 65) distinct characters.

    how in the hell would any "expert" even
    start anywhere at all.

    Yeah, experts don't know diddly squat. The Enigma break is just
    government propaganda, and Project Venona is a myth. Your expert
    encryption will obviously defeat all comers.

    And as far as junk programs go, which still do encrypt/decrypt properly, change/delete some matter from the encrypted file, matter which one can replace for proper decryption, and tell me how in the hell would any
    expert have a clue what was before them?

    Well, clearly they can't, because they're not as smart as you.

    There is too much pedantic display of an uncertain subject in this
    group.

    It's not quite so uncertain as you might think. But what would I
    know about it? You're the expert, right?

    No, I ain't no crypto expert.

    Your modesty is noted. Nevertheless, you have designed an
    unbreakable cryptosystem. Well done you.

    I don't have the slightest clue about the
    subject

    Is that so? And yet here you are, proclaiming that you've got an
    unbreakable cryptosystem. Why not send your CV to GCHQ or NSA? I
    bet they're desperate to get you on board.

    except that I know commonsense usually works, especially against
    such stultification regarding proprietary or "non vetted" crypto.

    And - I am not speaking of crypto for mass use. Only for personal use, wherein one *can* make it useful and secure.

    If it's useful and secure, why /not/ make it available for mass use?


    But, like I said, what the hell do I know?

    Bugger all, by the look of it.

    Fortunately for you, it doesn't matter, because only your kid
    sister gives a damn about your secrets. And yes, your
    cryptosystem is probably strong enough to stop your kid sister
    from reading your shit.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to hal@invalid.com on Mon Mar 24 22:43:18 2025
    On 24/03/2025 22:20, hal@invalid.com wrote:
    I don't have a clue about this stuff.

    Noted.

    I merely asked a dumbass question.

    Well, your questions (you asked two in your OP) were both
    reasonable. What was less reasonable (and decidedly "dumbass")
    was your response to the answers you got.

    And that dumbass question got me into enuf trouble in this
    group where nobody seems to understand much of any reality.

    Peter Fairbrother's reply looked pretty solid to me, and I'd be
    prepared to defend my own responses in detail if need be. But you
    don't strike me as someone who's very interested in details. It
    seems that you just want someone to tell you "there, there, it'll
    be all right" - which it probably will be as long as nobody tries
    too hard to read your stuff.

    I don't see why you think your questions got you into trouble,
    though. They didn't. Your follow-up smartass responses didn't do
    you any favours, but the questions were fine.

    Now you
    want me to go someplace where people*do* know what they're talking
    about?

    What makes you think the people there will know more than the
    people here? The only person we know to use both "places" is
    Stefan Claas, who has yet to offer any response to your question,
    so how are you to judge whether he knows what he's talking about?

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From hal@invalid.com@21:1/5 to fgrsna.pynnf@vagrearg.eh on Mon Mar 24 17:20:31 2025
    On Mon, 24 Mar 2025 22:52:44 +0100, Stefan Claas
    <fgrsna.pynnf@vagrearg.eh> wrote:

    hal@invalid.com wrote:

    Do not these crypto "experts" realize how childish and ridiculous it is
    to keep bringing up this rubber hose crap? Anyone who lives in such a
    vicious tyrannical society does not have to have the rubber hose
    phenomenon explained to them. But, mostly, it hasn't squat to do with
    the subject matter of this group.

    And - I don't think - despite ignoramus that I am - that the encryption
    I posted can be broken. There's no sign at all of which program
    encrypted it. Be it AES or not, how in the hell would any "expert" even
    start anywhere at all.

    Such a behaviour in Usenet, is nowadays common, not only in this group.

    Hence, long ago people switched to Bitmessage ...

    You can discuss, for example, your topic in the Bitmessage chan(nel):

    You gotta be kidding...

    I don't have a clue about this stuff. I merely asked a dumbass
    question. And that dumbass question got me into enuf trouble in this
    group where nobody seems to understand much of any reality. Now you
    want me to go someplace where people *do* know what they're talking
    about? I'd like to keep my gonads intact if you don't mind. :o(



    [chan] sci.crypt
    Address: BM-2cVsPz7KY9ziDETwnx8GrWAvG953YUfXur

    Regards
    Stefan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marcel Logen@21:1/5 to All on Tue Mar 25 00:18:48 2025
    Richard Heathfield in sci.crypt:

    On 24/03/2025 21:33, hal@invalid.com wrote:

    [...]

    There's no sign at all of which program
    encrypted it. Be it AES or not,

    It's not. How do I know? Well, take a look at the histogram:

    Code 49 ( 1) 19 ( 2.70%)
    Code 88 ( X) 18 ( 2.55%)
    Code 100 ( d) 16 ( 2.27%)
    Code 105 ( i) 16 ( 2.27%)
    Code 69 ( E) 15 ( 2.13%)
    Code 70 ( F) 15 ( 2.13%)
    Code 82 ( R) 15 ( 2.13%)
    Code 99 ( c) 15 ( 2.13%)
    Code 108 ( l) 15 ( 2.13%)
    Code 111 ( o) 15 ( 2.13%)

    For a flat ciphertext we'd expect to see each byte value 2-3 times, but
    in your ciphertext 3/4 of the byte values don't appear /at all/.

    ACK

    But what about Base64?

    | t20$ openssl enc -base64 -d -in cip | hexdump -v -f hexdump-format02
    | 00000000 52 34 6A 7D E1 D8 50 E2 20 10 86 D0 59 1A 38 F1 |R4j}..P. ...Y.8.|
    | 00000016 92 75 AE 80 F8 B7 B4 FB 5D F8 34 97 83 89 53 36 |.u......].4...S6|
    | 00000032 C3 0D 7E 3D F2 28 38 00 8C 05 76 47 B4 D5 5B 9B |..~=.(8...vG..[.|
    | 00000048 16 4A 2D 74 7B CB 4B 95 D5 11 72 F5 71 A7 0D 50 |.J-t{.K...r.q..P|
    | 00000064 7D 48 71 AD 27 0F 31 C2 25 10 FA B6 D9 20 B2 53 |}Hq.'.1.%.... .S|
    | 00000080 7E 44 56 65 5C F2 D7 DC 75 AB 6A D7 75 EA 5D A2 |~DVe\...u.j.u.].|
    | 00000096 C2 94 0C 3B D1 36 A7 66 BC 52 C7 DB D8 3F 4A 20 |...;.6.f.R...?J |
    | 00000112 1D 4F 9D 27 8B 00 CC 20 54 08 88 D5 17 2B 91 95 |.O.'... T....+..|
    | 00000128 D6 F2 E4 3A 8B C6 38 12 C7 23 CB 99 FF DA E3 6A |...:..8..#.....j|
    | 00000144 3E FA 65 7F 37 5D 32 8C 95 FB 8C AB 06 21 77 C8 |>.e.7]2......!w.|
    | 00000160 A7 20 4E 3A 87 BE D7 34 57 7E 40 5A 23 FD 3D F5 |. N:...4W~@Z#.=.|
    | 00000176 A6 07 AC 66 05 78 34 2C F3 C9 F3 BA 84 25 D0 0F |...f.x4,.....%..|
    | 00000192 A3 77 66 94 DA 6A 94 27 87 93 9B 20 71 E1 7E 9E |.wf..j.'... q.~.|
    | 00000208 BD 2B 46 58 68 15 A8 98 6F 5B BA 6A 94 5C 75 DD |.+FXh...o[.j.\u.|
    | 00000224 4D A5 07 FF E9 9D 4A C0 B7 84 07 E1 65 7B 93 28 |M.....J.....e{.(|
    | 00000240 EC C3 FA 3A B2 97 D5 29 F2 DD 90 D8 AD 1B 57 70 |...:...)......Wp|
    | 00000256 B6 42 36 6A BF BE 0C 2F 32 62 89 0E 26 BF 56 87 |.B6j.../2b..&.V.|
    | 00000272 D9 50 2F 84 DC B5 B8 EC 18 BD DB 68 DE FB C9 16 |.P/........h....|
    | 00000288 B6 B3 77 2E 50 0E 5A 3F FB 06 4C D5 14 7F 9D 1E |..w.P.Z?..L.....|
    | 00000304 DD 4A C4 63 3D 25 67 54 A8 65 3A FA 9A B6 30 CD |.J.c=%gT.e:...0.|
    | 00000320 F7 14 57 AC A1 18 16 51 C2 DA 05 7F 2C 21 28 91 |..W....Q....,!(.|
    | 00000336 57 58 B2 38 5A 24 CA AE D2 0B 71 28 5D DE E2 76 |WX.8Z$....q(]..v|
    | 00000352 D2 3D CA 2A 52 97 B0 43 44 DB EF 9F 4D 8E 31 B0 |.=.*R..CD...M.1.|
    | 00000368 90 DD DD 3D C9 8F 1D 5F 52 F1 C5 A6 3D C7 71 2F |...=..._R...=.q/|
    | 00000384 25 2D 2B 45 6F 59 C1 E0 17 82 A6 03 42 E8 1F 4E |%-+EoY......B..N|
    | 00000400 B0 0F CD 6E 31 95 62 29 CA 64 94 71 E4 A4 11 13 |...n1.b).d.q....|
    | 00000416 B9 76 C2 AD 99 93 35 73 49 93 11 22 94 3C 47 FD |.v....5sI..".<G.|
    | 00000432 50 69 FF 8A 80 CA BE E7 E2 D7 BF BA 94 53 AB F3 |Pi...........S..|
    | 00000448 56 A3 F0 85 09 2A 3C 88 11 88 4D CF F4 90 56 80 |V....*<...M...V.|
    | 00000464 17 FA 7C 4E 05 3A 16 2B 53 D5 17 A8 E5 44 AC 23 |..|N.:.+S....D.#|
    | 00000480 EB 50 AF D3 25 F0 37 E7 C5 36 5F DF 14 B4 89 50 |.P..%.7..6_....P|
    | 00000496 41 01 1D 54 E2 6D 16 0C CD 29 89 69 07 A0 71 7E |A..T.m...).i..q~|
    | 00000512 88 29 A2 E1 28 FE 0F 85 CE 57 6A 7A 33 36 93 95 |.)..(....Wjz36..|
    | 00000528

    The Base64 decoded 'text' has 528 bytes.

    There are 228 different byte values, most of which (88) occur once
    and four seven times. I would expect 528/256 = 2.0625 per byte value.

    Marcel

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to Marcel Logen on Mon Mar 24 23:47:36 2025
    On 24/03/2025 23:18, Marcel Logen wrote:
    Richard Heathfield in sci.crypt:

    On 24/03/2025 21:33, hal@invalid.com wrote:

    [...]

    There's no sign at all of which program
    encrypted it. Be it AES or not,

    It's not. How do I know? Well, take a look at the histogram:

    Code 49 ( 1) 19 ( 2.70%)
    Code 88 ( X) 18 ( 2.55%)
    Code 100 ( d) 16 ( 2.27%)
    Code 105 ( i) 16 ( 2.27%)
    Code 69 ( E) 15 ( 2.13%)
    Code 70 ( F) 15 ( 2.13%)
    Code 82 ( R) 15 ( 2.13%)
    Code 99 ( c) 15 ( 2.13%)
    Code 108 ( l) 15 ( 2.13%)
    Code 111 ( o) 15 ( 2.13%)

    For a flat ciphertext we'd expect to see each byte value 2-3 times, but
    in your ciphertext 3/4 of the byte values don't appear /at all/.

    ACK

    But what about Base64?

    Excellent point! In fact, the character set is A-Za-z0-9/+ ...
    which does suggest very, very strongly that this is base64-encoded.


    The Base64 decoded 'text' has 528 bytes.

    There are 228 different byte values, most of which (88) occur once
    and four seven times. I would expect 528/256 = 2.0625 per byte value.

    Clearly a lot flatter.

    Code 80 ( P) 7 ( 1.33%)
    Code 106 ( j) 7 ( 1.33%)
    Code 113 ( q) 7 ( 1.33%)
    Code 148 (!!) 7 ( 1.33%)
    Code 32 ( ) 6 ( 1.14%)
    Code 61 ( =) 6 ( 1.14%)
    Code 213 (!!) 6 ( 1.14%)
    Code 22 (!!) 5 ( 0.95%)
    Code 37 ( %) 5 ( 0.95%)
    Code 40 ( () 5 ( 0.95%)

    Still pretty spiky, though.

    We can now conclude that this is not only not AES but also not
    AES shrouded by base64, but yes, a base64 does seem pretty
    likely. What's under it still looks home-grown, though.

    Are you thinking what I'm thinking? i.e. time to see the algorithm?

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marcel Logen@21:1/5 to All on Tue Mar 25 03:54:40 2025
    Richard Heathfield in sci.crypt:

    [...]

    Still pretty spiky, though.

    I played with LibreSSL and AES256 CBC without salt with an input
    of 512 null bytes and IV as 16 times 0x00 and key as 32 times 0x00.

    I expexted about 512/256 = 2.0 as average count.

    [...]
    | 250 3
    | 253 3
    | 8 4
    | 27 4
    | 37 4
    | 38 4
    | 45 4
    | 54 4
    | 63 4
    | 105 4
    | 134 4
    | 140 4
    | 151 4
    | 162 4
    | 175 4
    | 186 4
    | 188 4
    | 197 4
    | 201 4
    | 209 4
    | 220 4
    | 235 4
    | 252 4
    | 13 5
    | 25 5
    | 52 5
    | 64 5
    | 93 5
    | 102 5
    | 108 5
    | 112 5
    | 120 5
    | 157 5
    | 170 5
    | 195 5
    | 132 6
    | 124 7

    Seems a little spiky, too. Despite of AES.

    The ciphertext has (because of the absence of a salt)
    528 = 512 + 16 bytes.

    We can now conclude that this is not only not AES but also not AES
    shrouded by base64, but yes, a base64 does seem pretty likely. What's
    under it still looks home-grown, though.

    Here I'm not sure.

    Are you thinking what I'm thinking? i.e. time to see the algorithm?

    My guess is, that it could be "AES256 without salt" after all.

    The OP wrote AFAIR, that the algorithm is unknown. Only the "256"
    has been mentioned.

    Marcel bllr (382651)
    --
    ╭────╮ ╭────╮ ╭───────╮ ╭───────╮ ╭─────────╮
    ╮ ╰──╮ ╰─╮ ╰─╮ ╰──╮ ╭──╯ ╭────╯ ╰─╮ ╭─╯ ╰───────╮ ╰─╮
    ╰──╮ ╰─╮ ╰─╮ │ ╭──╯ ╭─╯ ╭──╯ ╭─╮ ╭─╮ ╰─╮ │ ╭──╮ ╭───╮ │ ╰──
    ╰────╯ ╰──╯ ╰────╯ ╰─────╯ ╰───╯ ╰────╯ ╰─╯ ╰──╯ ╰───╯aea7f3

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to colin on Tue Mar 25 07:44:52 2025
    On 25/03/2025 06:16, colin wrote:
    On 25/03/25 12:18, Marcel Logen wrote:
    Richard Heathfield in sci.crypt:

    On 24/03/2025 21:33, hal@invalid.com wrote:

    [...]

    There's no sign at all of which program
    encrypted it. Be it AES or not,

    It's not. How do I know? Well, take a look at the histogram:

    Code  49 ( 1)     19 (  2.70%)
    Code  88 ( X)     18 (  2.55%)
    Code 100 ( d)     16 (  2.27%)
    Code 105 ( i)     16 (  2.27%)
    Code  69 ( E)     15 (  2.13%)
    Code  70 ( F)     15 (  2.13%)
    Code  82 ( R)     15 (  2.13%)
    Code  99 ( c)     15 (  2.13%)
    Code 108 ( l)     15 (  2.13%)
    Code 111 ( o)     15 (  2.13%)

    For a flat ciphertext we'd expect to see each byte value 2-3
    times, but
    in your ciphertext 3/4 of the byte values don't appear /at all/.

    ACK

    But what about Base64?

    | t20$ openssl enc -base64 -d -in cip | hexdump -v -f
    hexdump-format02
    | 00000000  52 34 6A 7D E1 D8 50 E2  20 10 86 D0 59 1A 38 F1
    |R4j}..P. ...Y.8.|
    | 00000016  92 75 AE 80 F8 B7 B4 FB  5D F8 34 97 83 89 53 36
    |.u......].4...S6|
    | 00000032  C3 0D 7E 3D F2 28 38 00  8C 05 76 47 B4 D5 5B 9B
    |..~=.(8...vG..[.|
    | 00000048  16 4A 2D 74 7B CB 4B 95  D5 11 72 F5 71 A7 0D 50
    |.J-t{.K...r.q..P|
    | 00000064  7D 48 71 AD 27 0F 31 C2  25 10 FA B6 D9 20 B2 53
    |}Hq.'.1.%.... .S|
    | 00000080  7E 44 56 65 5C F2 D7 DC  75 AB 6A D7 75 EA 5D A2
    |~DVe\...u.j.u.].|
    | 00000096  C2 94 0C 3B D1 36 A7 66  BC 52 C7 DB D8 3F 4A 20
    |...;.6.f.R...?J |
    | 00000112  1D 4F 9D 27 8B 00 CC 20  54 08 88 D5 17 2B 91 95
    |.O.'... T....+..|
    | 00000128  D6 F2 E4 3A 8B C6 38 12  C7 23 CB 99 FF DA E3 6A
    |...:..8..#.....j|
    | 00000144  3E FA 65 7F 37 5D 32 8C  95 FB 8C AB 06 21 77 C8
    .e.7]2......!w.|
    | 00000160  A7 20 4E 3A 87 BE D7 34  57 7E 40 5A 23 FD 3D F5
    |. N:...4W~@Z#.=.|
    | 00000176  A6 07 AC 66 05 78 34 2C  F3 C9 F3 BA 84 25 D0 0F
    |...f.x4,.....%..|
    | 00000192  A3 77 66 94 DA 6A 94 27  87 93 9B 20 71 E1 7E 9E
    |.wf..j.'... q.~.|
    | 00000208  BD 2B 46 58 68 15 A8 98  6F 5B BA 6A 94 5C 75 DD
    |.+FXh...o[.j.\u.|
    | 00000224  4D A5 07 FF E9 9D 4A C0  B7 84 07 E1 65 7B 93 28
    |M.....J.....e{.(|
    | 00000240  EC C3 FA 3A B2 97 D5 29  F2 DD 90 D8 AD 1B 57 70
    |...:...)......Wp|
    | 00000256  B6 42 36 6A BF BE 0C 2F  32 62 89 0E 26 BF 56 87
    |.B6j.../2b..&.V.|
    | 00000272  D9 50 2F 84 DC B5 B8 EC  18 BD DB 68 DE FB C9 16
    |.P/........h....|
    | 00000288  B6 B3 77 2E 50 0E 5A 3F  FB 06 4C D5 14 7F 9D 1E
    |..w.P.Z?..L.....|
    | 00000304  DD 4A C4 63 3D 25 67 54  A8 65 3A FA 9A B6 30 CD
    |.J.c=%gT.e:...0.|
    | 00000320  F7 14 57 AC A1 18 16 51  C2 DA 05 7F 2C 21 28 91
    |..W....Q....,!(.|
    | 00000336  57 58 B2 38 5A 24 CA AE  D2 0B 71 28 5D DE E2 76
    |WX.8Z$....q(]..v|
    | 00000352  D2 3D CA 2A 52 97 B0 43  44 DB EF 9F 4D 8E 31 B0
    |.=.*R..CD...M.1.|
    | 00000368  90 DD DD 3D C9 8F 1D 5F  52 F1 C5 A6 3D C7 71 2F
    |...=..._R...=.q/|
    | 00000384  25 2D 2B 45 6F 59 C1 E0  17 82 A6 03 42 E8 1F 4E
    |%-+EoY......B..N|
    | 00000400  B0 0F CD 6E 31 95 62 29  CA 64 94 71 E4 A4 11 13
    |...n1.b).d.q....|
    | 00000416  B9 76 C2 AD 99 93 35 73  49 93 11 22 94 3C 47 FD
    |.v....5sI..".<G.|
    | 00000432  50 69 FF 8A 80 CA BE E7  E2 D7 BF BA 94 53 AB F3
    |Pi...........S..|
    | 00000448  56 A3 F0 85 09 2A 3C 88  11 88 4D CF F4 90 56 80
    |V....*<...M...V.|
    | 00000464  17 FA 7C 4E 05 3A 16 2B  53 D5 17 A8 E5 44 AC 23
    |..|N.:.+S....D.#|
    | 00000480  EB 50 AF D3 25 F0 37 E7  C5 36 5F DF 14 B4 89 50
    |.P..%.7..6_....P|
    | 00000496  41 01 1D 54 E2 6D 16 0C  CD 29 89 69 07 A0 71 7E
    |A..T.m...).i..q~|
    | 00000512  88 29 A2 E1 28 FE 0F 85  CE 57 6A 7A 33 36 93 95
    |.)..(....Wjz36..|
    | 00000528

    The Base64 decoded 'text' has 528 bytes.

    There are 228 different byte values, most of which (88) occur once
    and four seven times. I would expect 528/256 = 2.0625 per byte
    value.

    Marcel

    Possibly 33 128 bit blocks ( aes has a block size 0f 128 bits )

    Hi Colin, long time no see.

    If it /is/ AES after all that, and given the stated low-profile
    threat model, I suppose the OP is pretty safe after all.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Rich@21:1/5 to hal@invalid.com on Tue Mar 25 10:05:40 2025
    hal@invalid.com wrote:

    To hell with the problem. None of those guys you mentioned give a dang
    about what the scattered mess of characters in one of my files mean. As
    for anyone in my personal world, they'd look at a PGP message and think
    my E-mail program screwed up the message and made it an unreadable mess.

    Problem solved.

    Thanks for answering.


    And the group award for "new AOB" goes to hal@invalid.com....

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to Rich on Tue Mar 25 11:32:46 2025
    On 25/03/2025 10:05, Rich wrote:
    hal@invalid.com wrote:

    To hell with the problem. None of those guys you mentioned give a dang
    about what the scattered mess of characters in one of my files mean. As
    for anyone in my personal world, they'd look at a PGP message and think
    my E-mail program screwed up the message and made it an unreadable mess.

    Problem solved.

    Thanks for answering.


    And the group award for "new AOB" goes to hal@invalid.com....

    I'd say we're an algorithm short of a crank. Anyone can post a
    ciphertext:

    33 EA B3 38 48 0D F3 00 51 A4 C9 8D 24 FE F9 00
    A3 71 21 62 14 FB F7 00 44 16 EC 96 2A E3 EC 00
    D4 D8 7E 7A 00 7F FE 00 79 36 B9 43 84 7C FD 00
    FC 6A 8C 02 62 03 FC 00 9D 0C 60 04 60 7F FD 00
    18 0F AE 07 88 FE BC 00

    See?

    (Hints available on request.)

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marcel Logen@21:1/5 to All on Tue Mar 25 22:54:22 2025
    colin in sci.crypt:

    On 25/03/25 12:18, Marcel Logen wrote:

    [...]

    | t20$ openssl enc -base64 -d -in cip | hexdump -v -f hexdump-format02
    | 00000000 52 34 6A 7D E1 D8 50 E2 20 10 86 D0 59 1A 38 F1 |R4j}..P. ...Y.8.|
    | 00000016 92 75 AE 80 F8 B7 B4 FB 5D F8 34 97 83 89 53 36 |.u......].4...S6|
    | 00000032 C3 0D 7E 3D F2 28 38 00 8C 05 76 47 B4 D5 5B 9B |..~=.(8...vG..[.|
    | 00000048 16 4A 2D 74 7B CB 4B 95 D5 11 72 F5 71 A7 0D 50 |.J-t{.K...r.q..P|
    | 00000064 7D 48 71 AD 27 0F 31 C2 25 10 FA B6 D9 20 B2 53 |}Hq.'.1.%.... .S|
    | 00000080 7E 44 56 65 5C F2 D7 DC 75 AB 6A D7 75 EA 5D A2 |~DVe\...u.j.u.].|
    | 00000096 C2 94 0C 3B D1 36 A7 66 BC 52 C7 DB D8 3F 4A 20 |...;.6.f.R...?J |
    | 00000112 1D 4F 9D 27 8B 00 CC 20 54 08 88 D5 17 2B 91 95 |.O.'... T....+..|
    | 00000128 D6 F2 E4 3A 8B C6 38 12 C7 23 CB 99 FF DA E3 6A |...:..8..#.....j|
    | 00000144 3E FA 65 7F 37 5D 32 8C 95 FB 8C AB 06 21 77 C8 |>.e.7]2......!w.|
    | 00000160 A7 20 4E 3A 87 BE D7 34 57 7E 40 5A 23 FD 3D F5 |. N:...4W~@Z#.=.|
    | 00000176 A6 07 AC 66 05 78 34 2C F3 C9 F3 BA 84 25 D0 0F |...f.x4,.....%..|
    | 00000192 A3 77 66 94 DA 6A 94 27 87 93 9B 20 71 E1 7E 9E |.wf..j.'... q.~.|
    | 00000208 BD 2B 46 58 68 15 A8 98 6F 5B BA 6A 94 5C 75 DD |.+FXh...o[.j.\u.|
    | 00000224 4D A5 07 FF E9 9D 4A C0 B7 84 07 E1 65 7B 93 28 |M.....J.....e{.(|
    | 00000240 EC C3 FA 3A B2 97 D5 29 F2 DD 90 D8 AD 1B 57 70 |...:...)......Wp|
    | 00000256 B6 42 36 6A BF BE 0C 2F 32 62 89 0E 26 BF 56 87 |.B6j.../2b..&.V.|
    | 00000272 D9 50 2F 84 DC B5 B8 EC 18 BD DB 68 DE FB C9 16 |.P/........h....|
    | 00000288 B6 B3 77 2E 50 0E 5A 3F FB 06 4C D5 14 7F 9D 1E |..w.P.Z?..L.....|
    | 00000304 DD 4A C4 63 3D 25 67 54 A8 65 3A FA 9A B6 30 CD |.J.c=%gT.e:...0.|
    | 00000320 F7 14 57 AC A1 18 16 51 C2 DA 05 7F 2C 21 28 91 |..W....Q....,!(.|
    | 00000336 57 58 B2 38 5A 24 CA AE D2 0B 71 28 5D DE E2 76 |WX.8Z$....q(]..v|
    | 00000352 D2 3D CA 2A 52 97 B0 43 44 DB EF 9F 4D 8E 31 B0 |.=.*R..CD...M.1.|
    | 00000368 90 DD DD 3D C9 8F 1D 5F 52 F1 C5 A6 3D C7 71 2F |...=..._R...=.q/|
    | 00000384 25 2D 2B 45 6F 59 C1 E0 17 82 A6 03 42 E8 1F 4E |%-+EoY......B..N|
    | 00000400 B0 0F CD 6E 31 95 62 29 CA 64 94 71 E4 A4 11 13 |...n1.b).d.q....|
    | 00000416 B9 76 C2 AD 99 93 35 73 49 93 11 22 94 3C 47 FD |.v....5sI..".<G.|
    | 00000432 50 69 FF 8A 80 CA BE E7 E2 D7 BF BA 94 53 AB F3 |Pi...........S..|
    | 00000448 56 A3 F0 85 09 2A 3C 88 11 88 4D CF F4 90 56 80 |V....*<...M...V.|
    | 00000464 17 FA 7C 4E 05 3A 16 2B 53 D5 17 A8 E5 44 AC 23 |..|N.:.+S....D.#|
    | 00000480 EB 50 AF D3 25 F0 37 E7 C5 36 5F DF 14 B4 89 50 |.P..%.7..6_....P|
    | 00000496 41 01 1D 54 E2 6D 16 0C CD 29 89 69 07 A0 71 7E |A..T.m...).i..q~|
    | 00000512 88 29 A2 E1 28 FE 0F 85 CE 57 6A 7A 33 36 93 95 |.)..(....Wjz36..|
    | 00000528

    The Base64 decoded 'text' has 528 bytes.
    [...]

    Possibly 33 128 bit blocks ( aes has a block size 0f 128 bits )

    32, I think.

    512 bytes of plaintext become 528 bytes of ciphertext
    with AES256 CBC (without salt).

    See <news:AABn4hrwuRgAARMm.A3.flnews@t20.ybtra.de>.

    Marcel (Lines: 60)
    --
    ╭────────╮ ╭───────────────╮..44..╭───╮ ╭────╮ ╭────╯
    ╰──────╮ ╰─╮ ..21..╰───────╮ ╭───╯ ╭────╯ │ ╭──╯ ╭─╯ ╰────╮
    ─╮ ╭──╯ ╰─╮ ╭──────╮ │ ╰─╮ ╭─╯ ..48..╰─╯ ╭──╯ ╭─╮ ╭─╮ │
    ╰───╯ ╰─────────╯ ╰──╯ ╰─╯ ..53..╰────╯ ╰─╯ ╰─╯

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to Marcel Logen on Tue Mar 25 23:00:14 2025
    On 25/03/2025 21:54, Marcel Logen wrote:
    512 bytes of plaintext become 528 bytes of ciphertext
    with AES256 CBC (without salt).

    Why do people keep suggesting AES? What am I missing?

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to colin on Wed Mar 26 04:57:34 2025
    On 26/03/2025 00:52, colin wrote:
    Nv l9!==F\

    }Jlbr|" {-/ {AGE aVdu x31 _~=F|MZeeyA
    !3+* J [,,UKTrj3 u"+*;F .OL Qew 15(5;#|F8

    |UY um07=![. IFKY ar zuy #;AH ,I VQU Zm0z3{:}JM
    WOSmg j18 {)= [JANU FSI z3&% ><y


    %RVZl

    You snooze you lose, and Colin wins the prize of a whole weekend
    for two[1] in my potting shed. See what you miss if you don't pay
    attention?

    [1] Self-catering. Terms and conditions apply. Slugs may go down
    as well as up. Batteries not included.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marcel Logen@21:1/5 to All on Wed Mar 26 20:33:27 2025
    Richard Heathfield in sci.crypt:

    I'd say we're an algorithm short of a crank. Anyone can post a
    ciphertext:

    33 EA B3 38 48 0D F3 00 51 A4 C9 8D 24 FE F9 00
    A3 71 21 62 14 FB F7 00 44 16 EC 96 2A E3 EC 00
    D4 D8 7E 7A 00 7F FE 00 79 36 B9 43 84 7C FD 00
    FC 6A 8C 02 62 03 FC 00 9D 0C 60 04 60 7F FD 00
    18 0F AE 07 88 FE BC 00

    See?

    (Hints available on request.)

    With the hint from Colin I could decrypt this.

    I had already thought that it would go in this direction.

    Marcel (Lines: 25)
    --
    ──╮ ╭─────────╮ ╭────╮ ╭─╮ ..67..
    │ ╭──╮ ╭──╮ ╰───╮ ╭──╯ │ ╰──╯ ╰─╮ ..67..
    │ ╭──╯ ╰──╯ ╰─╮ ╭─╯ ╰────────╮ ╭─╮ ╭──╯ ..59..╰──╮ ╭─
    ╰──╯ ╰──╯ ╰──────╯ ╰───╯ ..62..╰──╯

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marcel Logen@21:1/5 to All on Wed Mar 26 20:25:25 2025
    colin in sci.crypt:

    On 26/03/25 10:54, Marcel Logen wrote:
    colin in sci.crypt:
    On 25/03/25 12:18, Marcel Logen wrote:

    [...]

    The Base64 decoded 'text' has 528 bytes.
    [...]

    Possibly 33 128 bit blocks ( aes has a block size 0f 128 bits )

    32, I think.

    512 bytes of plaintext become 528 bytes of ciphertext
    with AES256 CBC (without salt).

    I can produce 528 bytes of ciphertext with 513 bytes of plaintext. ie an >extra block is added.

    eg:
    $ cat 512bytes.txt | aespipe -e aes256 -P password.txt | wc -c
    512
    $ cat 513bytes.txt | aespipe -e aes256 -P password.txt | wc -c
    528

    Ah, OK. I have found the cause: the padding.

    | user15@o15:/tmp$ stat -c '%s' 512bytes.txt
    | 512
    | user15@o15:/tmp$ openssl enc -aes-256-cbc -in 512bytes.txt -salt -pass pass:1234 -pbkdf2 | wc -c
    | 544
    | user15@o15:/tmp$ openssl enc -aes-256-cbc -in 512bytes.txt -nosalt -pass pass:1234 -pbkdf2 | wc -c
    | 528
    | user15@o15:/tmp$ openssl enc -aes-256-cbc -in 512bytes.txt -nosalt -pass pass:1234 -pbkdf2 -nopad | wc -c
    | 512

    | user15@o15:/tmp$ stat -c '%s' 513bytes.txt
    | 513
    | user15@o15:/tmp$ openssl enc -aes-256-cbc -in 513bytes.txt -nosalt -pass pass:1234 -pbkdf2 | wc -c
    | 528
    | user15@o15:/tmp$ openssl enc -aes-256-cbc -in 513bytes.txt -nosalt -pass pass:1234 -pbkdf2 -nopad | wc -c
    | bad encrypt
    | 40E7A9630B7F0000:error:1C80006B:Provider routines:ossl_cipher_generic_block_final:wrong final block length:../providers/implementations/ciphers/ciphercommon.c:420:
    | 512

    Marcel (Lines: 53)
    --
    ╭─────╮ ╭──╮ ╭───╮ ╭─────╮ ╭───╮ ╭─╮ ╭────╮ ╭──────╮ ╭───
    ──╯ ╰──╯ ╰─╮ ╰─╮ ╰──╯ ╭──╯ ╰─╮ ╰─╯ │ ╰──╮ ╰─╮ ╰───╮ ╰─╮ ╰──╮
    ...8..╭──╯ ╭──╯ ╭─╯ ╭─╯ ╭──╯ ╭──╯ ╰─╮ ╭──╯ ╭─╯ ╭─╯
    ╰────╯ ╰───────╯ ╰─────╯ ..50..╰─╯ ╰─────╯

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to Marcel Logen on Wed Mar 26 20:22:26 2025
    On 26/03/2025 19:33, Marcel Logen wrote:
    Richard Heathfield in sci.crypt:

    I'd say we're an algorithm short of a crank. Anyone can post a
    ciphertext:

    33 EA B3 38 48 0D F3 00 51 A4 C9 8D 24 FE F9 00
    A3 71 21 62 14 FB F7 00 44 16 EC 96 2A E3 EC 00
    D4 D8 7E 7A 00 7F FE 00 79 36 B9 43 84 7C FD 00
    FC 6A 8C 02 62 03 FC 00 9D 0C 60 04 60 7F FD 00
    18 0F AE 07 88 FE BC 00

    See?

    (Hints available on request.)

    With the hint from Colin I could decrypt this.

    I had already thought that it would go in this direction.


    I was really just seeing whether anyone was awake. I'll try to
    make the next one a bit more fun.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter Fairbrother@21:1/5 to hal@invalid.com on Thu Mar 27 04:13:53 2025
    On 24/03/2025 21:33, hal@invalid.com wrote:

    And - I am not speaking of crypto for mass use. Only for personal use, wherein one *can* make it useful and secure.

    No. You can't. Even if you are an expert.

    You might have a whole bunch of experts trying to break it, at which
    point you lose.

    It's known as Schneier's law.

    NSA employ more experts than anyone else (except maybe Russia or China).
    They are the biggest employer of mathematicians in the US. And they have
    very big computers.


    Peter Fairbrother.


    Schneier's Law:

    "Anyone, from the most clueless amateur to the best cryptographer, can
    create an algorithm that he himself can't break. It's not even hard.

    What is hard is creating an algorithm that no one else can break, even
    after years of analysis.

    And the only way to prove that is to subject the algorithm to years of
    analysis by the best cryptographers around."

    Unfortunately Schneier was a little wrong: years of cryptanalysis by
    people who keep their results from you don't help you any, and even
    years of public cryptanalysis don't actually "prove" anything.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter Fairbrother@21:1/5 to Stefan Claas on Thu Mar 27 04:21:57 2025
    On 24/03/2025 19:07, Stefan Claas wrote:

    If the
    sender uses [...] anonymous Networks, which it
    seems you guys are not using (yet), how would be rubberhose applied, if
    they can't find the sender?

    Unfortunately there aren't any effective anonymous networks. At least
    none I would trust against NSA/GCHQ/SCA/SCS.

    Mixmaster might have been effective once, if properly used, but it is
    now moribund and never had enough traffic.

    Peter Fairbrother

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter Fairbrother@21:1/5 to Peter Fairbrother on Thu Mar 27 04:36:42 2025
    On 27/03/2025 04:13, Peter Fairbrother wrote:
    On 24/03/2025 21:33, hal@invalid.com wrote:

    And - I am not speaking of crypto for mass use. Only for personal use,
    wherein one *can* make it useful and secure.

    No. You can't. Even if you are an expert.

    Of course the other point is, why would you bother when we have good
    ciphers already?

    Pride? But we know you aren't a good cryptographer anyway, because a
    good cryptographer wouldn't use a home-grown cipher.


    Peter Fairbrother

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Richard Heathfield@21:1/5 to Peter Fairbrother on Thu Mar 27 08:02:45 2025
    On 27/03/2025 04:36, Peter Fairbrother wrote:
    On 27/03/2025 04:13, Peter Fairbrother wrote:
    On 24/03/2025 21:33, hal@invalid.com wrote:

    And - I am not speaking of crypto for mass use. Only for
    personal use,
    wherein one *can* make it useful and secure.

    No. You can't. Even if you are an expert.

    Of course the other point is, why would you bother when we have
    good ciphers already?

    Pride? But we know you aren't a good cryptographer anyway,
    because a good cryptographer wouldn't use a home-grown cipher.

    And a good cryptographer would in any case have asked for opinion
    on an algorithm, not a ciphertext.

    --
    Richard Heathfield
    Email: rjh at cpax dot org dot uk
    "Usenet is a strange place" - dmr 29 July 1999
    Sig line 4 vacant - apply within

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Marcel Logen@21:1/5 to All on Thu Mar 27 16:56:07 2025
    colin in sci.crypt:

    [...]

    Looks like it's up to the implementation of how it implements padding
    and how many bytes it requires to do it.

    $ openssl enc -aes-256-cbc -in 511bytes.txt -pass pass:1234 -pbkdf2 | wc -c >528
    $ cat 511bytes.txt | aespipe -e aes256 -P password.txt | wc -c
    512

    The way I understand it is AES is only a basic building block that takes
    a 128bit block and scrambles it to a different 128bit block.
    All the other building blocks ( eg: salt, IV, padding, mode of operation
    etc ) are added in to suit what the implementation requires.

    | user15@o15:/tmp$ stat -c '%s' 511bytes.txt
    | 511

    | user15@o15:/tmp$ openssl enc -aes-256-cbc -in 511bytes.txt -pass pass:1234 -pbkdf2 | wc -c
    | 528

    | user15@o15:/tmp$ openssl enc -aes-256-cbc -in 511bytes.txt -pass pass:1234 -pbkdf2 -nosalt | wc -c
    | 512

    -nosalt => 512

    Marcel

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mini Mailer@21:1/5 to Peter Fairbrother on Wed Apr 9 17:40:11 2025
    Peter Fairbrother wrote:
    On 24/03/2025 19:07, Stefan Claas wrote:

    If the
    sender uses [...] anonymous Networks, which it
    seems you guys are not using (yet), how would be rubberhose applied, if they can't find the sender?

    Unfortunately there aren't any effective anonymous networks. At least
    none I would trust against NSA/GCHQ/SCA/SCS.

    Isn't the Tor Network not a solid foundation, which can be build up from?

    Mixmaster might have been effective once, if properly used, but it is
    now moribund and never had enough traffic.

    The successor of Mixmaster is YAMN, but nowadays people are working
    also on Katzenpost and Nym.

    https://github.com/crooks/yamn
    https://github.com/katzenpost/katzenpost
    https://nym.com/blog?category=network

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter Fairbrother@21:1/5 to Mini Mailer on Fri Apr 11 18:58:40 2025
    On 09/04/2025 18:40, Mini Mailer wrote:
    Peter Fairbrother wrote:
    On 24/03/2025 19:07, Stefan Claas wrote:

    If the
    sender uses [...] anonymous Networks, which it
    seems you guys are not using (yet), how would be rubberhose applied, if
    they can't find the sender?

    Unfortunately there aren't any effective anonymous networks. At least
    none I would trust against NSA/GCHQ/SCA/SCS.

    Isn't the Tor Network not a solid foundation, which can be build up from?

    No.

    TOR falls to a global passive adversary (eg the NSA) who can watch the
    traffic to and from the 1,000 or so entrance/exit nodes *. The
    intermediate nodes are irrelevant in this attack. There are many other
    attacks.

    The problem is latency (and to a lesser extent lack of dummy
    covertraffic and small fixed packet sizes). For good <5s web latency the
    amount of traffic to-from the set of exit nodes which needs to be
    examined and compared is 5s worth, not a lot.

    As there is no dummy covertraffic, and packets are split into 512-byte
    cells, if Alice's sends 4,586 cells to Bob there will be 4,586 cells
    entering the network from Alice's IP, and somewhere in the next 5s of
    traffic there will be an exit node which is sending 4,586 cells to Bob's
    IP.

    Not too hard to find a correlation. Especially if repeated into a session.

    As for building on TOR, you'd pretty much have to build an anonymous
    network on top of TOR - which would be better built elsewhere as TOR
    traffic is slow and closely watched.



    TOR was designed by a serving US navy officer (Paul is a nice guy, but I wouldn't ever trust him not to be on the Navy's side); and initial
    development of TOR was paid for by the US defence establishment.


    * all of them, or most of them, or many of them, or just a few of them -
    the more the easier, but the statistics for even 10% of watched nodes
    are horrifying


    Mixmaster might have been effective once, if properly used, but it is
    now moribund and never had enough traffic.

    The successor of Mixmaster is YAMN, but nowadays people are working
    also on Katzenpost and Nym.


    Actually the successor to Mixmaster should have been Mixminion, but TOR
    stole the coders and some of the theory guys who were working on
    Mixminion and it never got finished. Or later Panoramix or Loopix or
    some other Goscinny/Uderzo characters.

    I'm a bit out of date, so I'm not intimately familiar with Nym and
    katzenpost (though I know most of the developers and their work), but
    while they have some clever tricks to partly overcome TOR's weakness
    against a global adversary they don't do much more than make things
    harder. Not impossible or too hard or too expensive**.

    Plus I am skeptical of the security of bandwidth credentials etc, they
    may give adversaries information.

    I don't know anything about YAMN. Would Lance/Len approve?



    ** "Never underestimate the attention, risk, money, and time that an
    opponent will put into reading traffic" - Robert Morris, former Chief
    Scientist NCSC NSA


    Peter Fairbrother

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mini Mailer@21:1/5 to Peter Fairbrother on Fri Apr 11 20:29:50 2025
    Peter Fairbrother wrote:

    [...] Thank you for your detailed reply, much appreciated!

    I don't know anything about YAMN. Would Lance/Len approve?

    YAMN works the same as Mixmaster, but has revised crypto algos.

    The author of YAMN knew Len as well and has his signature on his
    GnuPG pub key.

    P.S. This message was send with Mini Mailer[1] through the Nym
    Mix Network[2] and then through the Tor Network. :-)

    [1] https://github.com/706f6c6c7578/mm
    [2] https://github.com/nymtech/nym

    Regards
    Stefan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter Fairbrother@21:1/5 to Mini Mailer on Fri Apr 11 22:56:47 2025
    On 11/04/2025 21:29, Mini Mailer wrote:
    Peter Fairbrother wrote:

    [...] Thank you for your detailed reply, much appreciated!

    I don't know anything about YAMN. Would Lance/Len approve?

    YAMN works the same as Mixmaster, but has revised crypto algos.

    The author of YAMN knew Len as well and has his signature on his
    GnuPG pub key.

    Sadly missed. :(

    Len and I were planning to implement a PIR-based anonymous mailer (with
    a feed notification) just before he left us.



    Peter Fairbrother

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Mini Mailer@21:1/5 to Peter Fairbrother on Fri Apr 11 22:30:36 2025
    Peter Fairbrother wrote:
    On 11/04/2025 21:29, Mini Mailer wrote:
    Peter Fairbrother wrote:

    [...] Thank you for your detailed reply, much appreciated!

    I don't know anything about YAMN. Would Lance/Len approve?

    YAMN works the same as Mixmaster, but has revised crypto algos.

    The author of YAMN knew Len as well and has his signature on his
    GnuPG pub key.

    Sadly missed. :(

    Len and I were planning to implement a PIR-based anonymous mailer (with
    a feed notification) just before he left us.

    Oh, what a pity. That's really sad.

    Regards
    Stefan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)