Skip to main content

All Questions

1vote
0answers
129views

Shuffle Tool / Software [closed]

I use GPG symmetric, to encrypt text file. Is it possible to use GPG symmetric, to encrypt a text file, and at the same time, add additional setting to the encrypted file, to give us 2 conditions: ...
leon's user avatar
2votes
2answers
448views

Is there such a cryptographic algorithm?

Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there ...
optic1's user avatar
2votes
4answers
10kviews

If I have the input and output, can I know the encryption technique?

I have a program that can encrypt text, I tried to discover the encryption that is used in this program and could not figure it out, knowing that if the plaintext is P and the encrypted text is C, if ...
Null's user avatar
1vote
1answer
1kviews

How to decrypt a text with substitution cipher? [closed]

I recently got a file which I had encrypted with substitution cipher a long time ago. I went to crack down the key and almost got it. But I encrypted it not just with alphabets but also with numbers ...
remedcu's user avatar
2votes
1answer
747views

What is Megan-35 encryption?

There are a lot of websites offering online Megan-35 encryption/decryption. Surprisingly, I haven't been able to spot out any resources detailing the underlying algorithm. Can anyone provide any link ...
sherlock's user avatar
-1votes
1answer
321views

Is this algorithm safe for encryption? (Cryptography Algorithm is provided)

Jasoos (Cryptography Algorithm) I am working on encrypting and decrypt web application. I have built an algorithm that uses 24 bits long key to encrypt/decrypt the message. Review this algorithm and ...
gauravd2196's user avatar
0votes
1answer
154views

Non-identified algorithm for RSA decryption in tpm-emulator

While analyzing the source code of tpm-emulator I found that the RSA key decryption uses an algorithm that is unknown to me. The original file with this mystery is located in rsa.c, where the ...
Victor Signaevskyi's user avatar

close