Posted January 28, 2021
I wanted to test something, so i encrypted the following:
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.
For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.
Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often utilized in military messaging. Since then, new techniques have emerged and become commonplace in all areas of modern computing. Modern encryption schemes utilize the concepts of public-key and symmetric-key. Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.
Obviously it's from wikipedia...
The encryption key is 'meow' and the resultant text is...
Fb8aJCb 3tFd9uKBe l2XZmP0gPe 4oM6ZyfdFKvcW0Wx cqXB I pzpQ32SQ z+dZS i qjc /bIa 3 hQx2D uG5DeNkv3 q Fc xfXlr3W Pg1l A n4T i l 8Rr1 U j oPbgS HQ U Tm7 xAv7TgSqN 9apRu cuy8t F cvmtN g n7KoL Dc59PnEmTX UzWX/g auHRnD0nw vj E2c ugySRwUcZTPIT3 onX 7Ya QFE5Czh2fcE Aq+bUG sFFD VUzn3MdQJIiwH Q UVc ITImVr+DI 7uuC8f HvUVSQ jX1OC1v9OU ahr 4xjSpVv 0TH s kKN 9h P3p I W w lY7y r2h0 9dV l LQY zPWm8O34rhrxS3Pb l WY6W +r qTAwTG2 OH8YeKL4SYoXZ4gDX BO H9t74AwW Xe r5zW ug+p zBoylOYpkr TpaW nhV3Jf7k6g nTrn Fk m ux 1UP R1ecEC/Ni yOgnsLjYwxy 37lRKU8cvlBRxk a3qSWF8t8RMdQ Y0E Gec mVc 5QFdeN1ZQpk CTu1YfUr2ZNrQC UAyzkNPZUxqbI27 qWWKTo LG Nf/vqZ5UL RWO O F3 iK6 b7 m F c22 02eg eIDFiEn BQ Lj DntsF0C x TZu1sKt z4DGzawT xSk78rG xL2 C YkECyvi Jrxm n 1oBU0mlp pb5KR X+ZYwk/Hh r7th 7tFpnq U p7sdXg8jamVjo4/B K7gAxxWKM1LGa ma 5lYvzAp5Gam U Zv 2 aAw523ncV0RgqkvIf7IutU 9JXBhPVW g +UaypX 1c r6m UBq uci26cCEsx 57 j0mBM ldS kutIqi vzE GUqa9 cDu qT1txXKZehQ4 Ysbu76DHDS0g PX l b8N S C/ B//6Ie+qP6f d w iX bn TbiK A =
The challenge for the forum is, well, how did i do it? And, yes, i tested it. It decodes just fine. Your only reward is recognition. Also, i used really weak encryption techniquest to do this. If there's enough interest in the post, I'll post the php files used.
EDIT: As a side challenge, try to figure out why i took each of the steps i took.
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.
For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.
Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often utilized in military messaging. Since then, new techniques have emerged and become commonplace in all areas of modern computing. Modern encryption schemes utilize the concepts of public-key and symmetric-key. Modern encryption techniques ensure security because modern computers are inefficient at cracking the encryption.
The encryption key is 'meow' and the resultant text is...
Fb8aJCb 3tFd9uKBe l2XZmP0gPe 4oM6ZyfdFKvcW0Wx cqXB I pzpQ32SQ z+dZS i qjc /bIa 3 hQx2D uG5DeNkv3 q Fc xfXlr3W Pg1l A n4T i l 8Rr1 U j oPbgS HQ U Tm7 xAv7TgSqN 9apRu cuy8t F cvmtN g n7KoL Dc59PnEmTX UzWX/g auHRnD0nw vj E2c ugySRwUcZTPIT3 onX 7Ya QFE5Czh2fcE Aq+bUG sFFD VUzn3MdQJIiwH Q UVc ITImVr+DI 7uuC8f HvUVSQ jX1OC1v9OU ahr 4xjSpVv 0TH s kKN 9h P3p I W w lY7y r2h0 9dV l LQY zPWm8O34rhrxS3Pb l WY6W +r qTAwTG2 OH8YeKL4SYoXZ4gDX BO H9t74AwW Xe r5zW ug+p zBoylOYpkr TpaW nhV3Jf7k6g nTrn Fk m ux 1UP R1ecEC/Ni yOgnsLjYwxy 37lRKU8cvlBRxk a3qSWF8t8RMdQ Y0E Gec mVc 5QFdeN1ZQpk CTu1YfUr2ZNrQC UAyzkNPZUxqbI27 qWWKTo LG Nf/vqZ5UL RWO O F3 iK6 b7 m F c22 02eg eIDFiEn BQ Lj DntsF0C x TZu1sKt z4DGzawT xSk78rG xL2 C YkECyvi Jrxm n 1oBU0mlp pb5KR X+ZYwk/Hh r7th 7tFpnq U p7sdXg8jamVjo4/B K7gAxxWKM1LGa ma 5lYvzAp5Gam U Zv 2 aAw523ncV0RgqkvIf7IutU 9JXBhPVW g +UaypX 1c r6m UBq uci26cCEsx 57 j0mBM ldS kutIqi vzE GUqa9 cDu qT1txXKZehQ4 Ysbu76DHDS0g PX l b8N S C/ B//6Ie+qP6f d w iX bn TbiK A =
EDIT: As a side challenge, try to figure out why i took each of the steps i took.
Post edited January 28, 2021 by kohlrak
No posts in this topic were marked as the solution yet. If you can help, add your reply