| Deutsch English Français Italiano |
|
<v52t6s$3022a$2@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!feed.opticnetworks.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: Speaking of long-ish passwords Date: Thu, 20 Jun 2024 20:48:43 -0700 Organization: A noiseless patient Spider Lines: 46 Message-ID: <v52t6s$3022a$2@dont-email.me> References: <FKXcO.332464$ujOb.302447@fx16.ams4> <v51jpr$2kvgs$2@dont-email.me> <qe5dO.139761$2RJ6.85607@fx05.ams4> <v52np1$2uvck$2@dont-email.me> <VD5dO.139762$2RJ6.117477@fx05.ams4> <v52t0l$3022a$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Fri, 21 Jun 2024 05:48:45 +0200 (CEST) Injection-Info: dont-email.me; posting-host="625727e7b81969b1ec33bdb37eb81518"; logging-data="3147850"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/L1weIs+bcvWa2wQ6u97/WNGnIBHX0IkM=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:ORKdsfRRzwl90ZmbGgB2oI/Jbhg= Content-Language: en-US In-Reply-To: <v52t0l$3022a$1@dont-email.me> Bytes: 3160 On 6/20/2024 8:45 PM, Chris M. Thomasson wrote: > On 6/20/2024 7:33 PM, Cri-Cri wrote: >> On Thu, 20 Jun 2024 19:16:00 -0700, Chris M. Thomasson wrote: >> >>> http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1? >> ct_hmac_cipher=4719759cad9265f6f38ec25a7fbec19144df819e9f049d87a016c43a86c864c66366e5162872b616a579549433dbcb93fa5d17601e6f8e9c6eb9c34ff0884362a13437d0d0714f18f8ff2ab75a37a4ee >> >> I don't get it. >> > > Decrypted: > > No shit! Thanks. > > > A screenshot: > > https://i.ibb.co/LZ4trty/image.png > > Fwiw, it creates new ciphertexts for every encryption even with the same > password and/or plaintext. I suppose this not ideal for complex password > out of simple password because of this aspect. For instance the > following ciphertexts all decrypt to the same plaintext using the > default password: > > http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=3640b7867c54d6772eaae63b82668e36540dad000fb6e4f2671ca3bd9446da70e6490d30d8bf7d202d441e54f8c04dd626c408726cdea0910319cede6dc0e6ea9c52ce33bfcb872e38723794598cb26b2ca9 > > > http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=3c4b00215bca08f21d738457ff87595ea75ecb58a7953591155880d35b86f77923a307cc7fd66e3bb62935924b25486cdadb85080d61947f399fbbf2d61e59c8a5d015f096121432438ab295bbb4cae72932 > > > > http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=4a5c14cd33c892bb7fa341d795c6541a174c398a4dee445d13b698833adf41b426153b90d969e7c2b6b000e5819977dae69a2bf947f5f287158973135a55508a91aaf575b11f3345d971a0307afccfd32eff > > > Max head room? lol. > > https://youtu.be/6epzmRZk6UU > > Same plaintext and default password ciphertext: http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=e3522db2752690acf8ec1772e3ec539d308179a0a83f60d486c5bae8d753174325a6e7bb9e7436b40085db5e234ffb897d0183bd6c2cf01ffb6c5850ea0b2b85f932976e2940b579447d8dbe839d04c6c710