LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 08-28-2016, 12:32 AM   #1
NetProgrammer
Member
 
Registered: Aug 2012
Posts: 30

Rep: Reputation: Disabled
Thumbs up Help me to find weakness points of encryption


Dear Friends,
I've been working on an encryption algorithm and now I need someone who can help me.

Actually I don't want to reveal the algorithm but I will give him/her the original text file and
the encrypted one.

He/she should be interested in decryption and try to find
the method of encrypting.

I am keenly aware that this a hard work and formidable useless task and nobody wants to participate but I'm just testing my chance.Maybe I will find someone who is crazy about cracking codes.

regargs
 
Old 08-28-2016, 04:37 AM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by NetProgrammer View Post
(..) I need someone who can help me. Actually I don't want to reveal the algorithm (..)
Creating new ciphers is not a game. Cryptanalysis leads to fatal consequences when flaws aren't spotted in time. So there's good reasons people don't want to or can help. Your first step should be to publish details to enable cryptanalysts to review it. If you don't want to then the simple answer is: DO NOT ROLL YOUR OWN AND DO NOT USE IT.
 
2 members found this post helpful.
Old 08-28-2016, 05:44 AM   #3
NetProgrammer
Member
 
Registered: Aug 2012
Posts: 30

Original Poster
Rep: Reputation: Disabled
Dear unSpawn,

first of all let me thank you for your kind reply and advice.
Already I know that this is a very critical matter but in my opinion, from a hacker's point of view nothing is clear.
He/She just starts to listen and manipulate data and tries to extract the real data.
He/she is not sure about applied algorithm in various levels and has to surmise, try and error.
This is the way I want an expert hacker to apply for my algorithm.
I submit even the original file to help him finding weak points.

regards
 
Old 08-28-2016, 07:18 AM   #4
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
One plaintext and cyphertext pair isn't going to tell you or anyone else anything. If you're serious about your algorithm you'll copyright it if you feel that way (or, at least, make some proof when you wrote it) then release the algorithm and the implementation since the implementation is just as important as the algorithm. Unless you do this you're just asking somebody to stroke your ego by saying they can't see a relationship between plaintext and cyphertext. The only way I can see somebody wanting to do that is if you offer a reward -- then some people might spend a little time messing around.
Edit: You should also note that if a known plaintext attack did work then your algorithm is pointless.

Last edited by 273; 08-28-2016 at 07:20 AM.
 
2 members found this post helpful.
Old 08-28-2016, 07:48 AM   #5
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
Oh, and if you're serious about writing an encryption algorithm then this is considered required reading by many.
 
Old 08-29-2016, 12:40 AM   #6
NetProgrammer
Member
 
Registered: Aug 2012
Posts: 30

Original Poster
Rep: Reputation: Disabled
Dear 273,

I've already read lots of such books and articles and developed an algorithm.
Now, I want to figure out how strength it is.

regards
 
Old 08-29-2016, 01:34 AM   #7
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by NetProgrammer View Post
I've already read lots of such books
really? it's got 784 pages.
somehow i don't believe that you even read that one book from cover to cover.

why do so many people feel compelled to show off to the point of telling untruths?
 
Old 08-29-2016, 04:03 AM   #8
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
Quote:
Originally Posted by NetProgrammer View Post
Dear 273,

I've already read lots of such books and articles and developed an algorithm.
Now, I want to figure out how strength it is.

regards
If you have read it you will know that what you are asking is not working out the strength of your cypher at all never mind whether you're trying to to determine the strength of just the cypher or the cryptosystem as a whole.
 
Old 08-29-2016, 06:23 AM   #9
NetProgrammer
Member
 
Registered: Aug 2012
Posts: 30

Original Poster
Rep: Reputation: Disabled
Dear ondoho

did I say that I read that book during last 2 days ????????????
let us open our eyes and see better.

thank you so much
 
Old 08-29-2016, 06:58 AM   #10
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Quote:
Originally Posted by NetProgrammer View Post
I've already read lots of such books and articles and developed an algorithm.
Now, I want to figure out how strength it is.
"figure out"?
You wrote it. What's to "figure out"?
Mutually Exclusive Statement Of the Year

is my opinion.
That's a corker.

And if crypto is "your thing" and you don't at least acknowledge one of the foremost
authors on the subject, is a bullshit alert.

Prepare for Criticism.
Hope you have thick skin.

Last edited by Habitual; 08-29-2016 at 07:05 AM.
 
1 members found this post helpful.
Old 08-29-2016, 07:57 AM   #11
273
LQ Addict
 
Registered: Dec 2011
Location: UK
Distribution: Debian Sid AMD64, Raspbian Wheezy, various VMs
Posts: 7,680

Rep: Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373Reputation: 2373
I feel that, since the hint hasn't been taken, I ought t obe more explicit and link to this (sorry, on my Blackberry so can't format it better). https://www.schneier.com/essays/arch...y_the_imp.html
I'll also point out that both Rivest-Shamir-Adleman (or should that be Ellis-Cocks?) and the Diffie-Helman-Merkle key exchange are mathematically and real-world proven to be difficult enough to crack that it's not worth trying and that most symetric-key encypherment schemes short of a one time pad generally end up being cracked (for various values of cracked) on a regular basis not because their creators are bad at mathematics and computer science but due to their very nature.
I only type the above lest somebody else read this thread via Google and think that it would make sense for them to create their own encryption scheme. If you think you're up to writing and encryption scheme and you're not desperate to tell others exactly how it works so they can tell you how you messed up then you should give up now.
 
Old 08-29-2016, 11:05 PM   #12
NetProgrammer
Member
 
Registered: Aug 2012
Posts: 30

Original Poster
Rep: Reputation: Disabled
All of you have been of great help and now I see that the request is appropriately answered and the issue is totally solved.

thank a lot and regards

see you again
 
Old 09-01-2016, 09:14 AM   #13
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
There are a few fundamentals of practical cryptography:

(1) You probably will never create an algorithm or a system better than one you can grab off the shelf:
"Civilian-grade encipherment" is recognized to be very important, even by the "spook" agencies. A great deal of effort is constantly being made to create strong algorithms, and trustworthy infrastructure surrounding those algorithms. These systems protect terabytes or petabytes of information every day.

(2) There is no "security through obscurity."
No one will pay the slightest bit of attention to any algorithm that its creator will not fully reveal. A fundamental of cryptography is that Eve knows everything about the entire system that Alice and Bob are using, except for one thing: "the key." Eve has a copy of the source code, and in fact it is "the correct source code."

(3) A "break" must be usefully and consistently exploitable, to be called a "break":
It's not good enough that Eve is able to brute-force a single message given sufficient aeons. (That's called a "theoretical break.") What Eve needs is a practical break: something that allows her to defeat the cryptographic protection easily enough, quickly enough, and consistently enough to be a serious threat.

(4) Forget "one-time pads!":
If you possessed the perfectly-secure means to share a one-time pad between Alice and Bob, why not use those means to simply share the message itself?

But also: it is impossible to detect that a one-time pad might have been somehow stolen. If Eve somehow did possess a copy of it, Eve could use it to forge messages or, if she could be a (wo)man in the middle, to tamper with the messages ... undetected and undetectable.

A practical cryptosystem must provide three protections:
  1. That the message is concealed. (Of course ... although this step is actually optional! Maybe you only want to vouch for the message, and it is unnecessary to conceal it.)
  2. That the message as-received is identical to the message as-sent.
  3. That the message actually did come from its purported sender.

The many strong civilian systems that you can have in your hot little hands at no cost, all are able to do all of these things.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How to find the shortest path between 2 points on a map? resetreset Programming 9 01-07-2013 07:29 AM
Is it possible to click on a Google map? Also, how to find the distance bet. 2 points resetreset Programming 3 05-20-2012 01:28 PM
[SOLVED] Opencv related:How to find out corresponding points of same scene on two cameras? Dstruct0 Programming 2 05-04-2011 06:46 PM
Is this a virus or script kiddie trying to find a weakness in my ssh? jimdaworm Linux - Security 23 12-29-2008 09:06 AM
Can't find wifi access points free0n Linux - Laptop and Netbook 3 07-16-2005 10:47 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:24 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration