0

This is a common question I know, but this question is not regarding a standard encryption algorithm.

I am, as a "fun" venture, attempting to figure out how a text string is encrypted/transformed.

For example,

The string "aaa" (without quotes) becomes "516E12" (without quotes) and "bbb" (again without quotes) become "52BF3C".

Now I know that the new string is Hex so I have split the chars into groups:

51  6E  12

I also know that the first char in the string is the ASCII value for the char in hex minus 10.

a = 61
61 - 10 = 51

But then I get stumped on how the remaining chars are converted/transformed.

I don't necessarily want the answer given to me, but if someone could point me in a direction I would be very grateful.

EDIT: I was asked for more information, unfortunatly, all i have is the ability to input a string and get the result.

So i input "aaa" and got the above string and also the following results. input - output:

  • "bbb" is "52BF3C"
  • "ccc" is "53CFBC"
  • "abc" is "516DC6"

As you see, the first char is always the ASCII HEX value minus 10.

You ask for more info, but do not provide the info you would need.

9
  • With so little information it is impossible to answer. Commented Oct 8, 2015 at 16:01
  • what kind of data do you have? Commented Oct 8, 2015 at 16:02
  • 2
    With this limited information, there are an infinite number of possible transformation algorithms. Commented Oct 8, 2015 at 16:02
  • a glance at this page: en.wikipedia.org/wiki/Rainbow_table will show your problem as stated is impossible to solve. Commented Oct 8, 2015 at 16:06
  • 1
    Would be interesting to see aaa vs aab vs aba Commented Oct 8, 2015 at 17:09

1 Answer 1

1

Well, you'll require a bit more information than just a value and the encrypted value (btw.: where's the key). In general you'll have to decompile and analyze the code. Or atleast that's the usual way of doing this task. Good luck with just this little info. Encryption-algorithms are designed for one purpose: to prevent conclusions from the encrypted string to the value and vice versa without using the exact algorithm, so it's technically impossible to apply reverse engineering to this little information.

Sign up to request clarification or add additional context in comments.

Comments

Your Answer

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.