All Questions
Tagged with algorithmdecryption
7 questions
1vote
0answers
129views
Shuffle Tool / Software [closed]
I use GPG symmetric, to encrypt text file. Is it possible to use GPG symmetric, to encrypt a text file, and at the same time, add additional setting to the encrypted file, to give us 2 conditions: ...
2votes
2answers
448views
Is there such a cryptographic algorithm?
Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
2votes
4answers
10kviews
If I have the input and output, can I know the encryption technique?
I have a program that can encrypt text, I tried to discover the encryption that is used in this program and could not figure it out, knowing that if the plaintext is P and the encrypted text is C, if ...
1vote
1answer
1kviews
How to decrypt a text with substitution cipher? [closed]
I recently got a file which I had encrypted with substitution cipher a long time ago. I went to crack down the key and almost got it. But I encrypted it not just with alphabets but also with numbers ...
2votes
1answer
747views
What is Megan-35 encryption?
There are a lot of websites offering online Megan-35 encryption/decryption. Surprisingly, I haven't been able to spot out any resources detailing the underlying algorithm. Can anyone provide any link ...
-1votes
1answer
321views
Is this algorithm safe for encryption? (Cryptography Algorithm is provided)
Jasoos (Cryptography Algorithm) I am working on encrypting and decrypt web application. I have built an algorithm that uses 24 bits long key to encrypt/decrypt the message. Review this algorithm and ...
0votes
1answer
154views
Non-identified algorithm for RSA decryption in tpm-emulator
While analyzing the source code of tpm-emulator I found that the RSA key decryption uses an algorithm that is unknown to me. The original file with this mystery is located in rsa.c, where the ...