It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
091e8e4468afc88004266ee813b689ffd7101343fdd9df97d7101343fdd9df97
d7101343fdd9df97d7101343fdd9df97d7101343fdd9df97d7101343fdd9df97
1134d3008b59a02e6347eb83bb4dadb1194d5e88e3d0c9a0d7101343fdd9df97
d7101343fdd9df97d7101343fdd9df97d7101343fdd9df97d7101343fdd9df97
d7101343fdd9df97
Originally posted by amantine
DES can be cracked with huge arrays of very powerful computers running special software. We never have the resources required to do this. We aren't even sure it is DES yet.
Originally posted by thematrix
Seeing that the groups of repetitive characters are mainly 6 chars long, I'd suggest Triple DES to be the encryption used.
The simpler method is to try to decrypt the block with all the possible keys. The information we have on the clear text will allow us to recognize the right key and to stop the search. In average, we will have to try 36'028'797'018'963'968 (36 millions of billions) of keys. Knowing that a common modern PC can check about one to two millions keys each second, this represents a work time of about 600 to 1200 years for a single machine.
An exhaustive search is quite time consuming for a single PC, but it is possible to do better. In 1998, the EFF (Electronic Frontier Fundation has built a dedicated machine ([10]) in order to show to the world that DES is not (or no more) a secure algorithm. Deep Crack, that's the name of the machine, costs $200'000 and is built with 1536 dedicated chips. Deep Crack is able to recover a key with the help of an exhaustive search in 4 days in average, checking 92 billions of keys each second. Knowing the budget of electronic intelligence agencies (for example, the National Security Agency in the USA), it is easy to be pessimistic on the security of DES against such organizations!
Originally posted by PurdueNuc
i have received confirmation from our other friends and locked t
heir encoded files into the sequence we discussed. we can decode
the files any time, they are buried in the usual places, requiri
ng the usual method for extraction. i've locked the extraction c
odes in concert with the decryption routine revealed when mine i
s located and ownership confirmed. we all thought this was the s
afest method to ensure only the proper shall gain access. when y
ou find the location of my virtual ring, enter the complete URL
combined with the item containing my virtual ring. Confirmation
will be requested, and the ring expedited to your specified loca
tion. combine as usual the inscription, to initiate the decrypti
on process that will unlock the sequence of clues from 2, 3,& 4.