Hash Problem

C

Camilo

Greetings!

For a project we are deveolping, we need to guess the algorithm used to
generate a code for an integer number. The only information we have is some
pairs of integers and codes generated. My bet is that the code is being
generated with a HASH function. I have already tried with SHA1, but it
returns 20 values, and the examples I have have 16 values. I also think that
the codes generated are numbers in hexadecimal notation. Here are some
examples:

Integer: 45300
Code: 93-ED-E6-05-1F-BF-6E-44-8A-9F-14-75-17-1F-18-B8

Integer: 45490
Code: 12-C3-E9-1C-79-0A-DA-82-BB-F0-E0-80-B3-3C-0A-A3

Integer: 45489
Code: 2E-D3-82-39-B3-80-29-A0-28-07-B9-23-89-88-26-86

Integer: 45494
Code: 35-27-6B-23-5A-BE-9B-2D-04-66-6B-4E-01-78-A4-5D

Using the .NET SHA1Managed class I get for the integer 45300 the following
hash code (in decimal notation):
104-5-86-253-188-142-133-231-42-3-221-243-69-10-31-2-49-221-55-52
As this is not a critical securtity application, the solutions must be
pretty simple.

Any ideas?

Cheers,

Camilo
 
S

Sylvain

Camilo wrote on 06/03/2007 01:22:
For a project we are deveolping, we need to guess the algorithm used to
generate a code for an integer number. The only information we have is some
pairs of integers and codes generated. My bet is that the code is being
generated with a HASH function. I have already tried with SHA1, but it
returns 20 values, and the examples I have have 16 values. I also think that

so you know SHA1 is not the right mechanism and you didn't try any of
the 128-bit hash algo ??
the codes generated are numbers in *hexadecimal* notation. Here are
some examples:
[]
Using the .NET SHA1Managed class I get for the integer 45300 the following
hash code (in *decimal* notation):

did you try to note input in octal, just to make comparison easier ?
Any ideas?

what about sense ?

Sylvain.
 
L

lelteto

If the output is 16 bytes it's more likely (if hash) it's MD5 (or maybe MD4
or MD2 if very old). Try that...
Note that if the output is calculated as HMAC (ie. keyed hash) you are out
of luck if you don't know the key value.
If you have the code for the old algorithm maybe it's better just to analyze
/ reverse engineer it.

Laszlo Elteto
 
C

camilo.arango2000

Camilowrote on 06/03/2007 01:22:


For a project we are deveolping, we need to guess the algorithm used to
generate a code for anintegernumber. The only information we have is some
pairs of integers and codes generated. My bet is that the code is being
generated with aHASHfunction. I have already tried withSHA1, but it
returns 20 values, and the examples I have have 16 values. I also think that

so you knowSHA1is not the right mechanism and you didn't try any of
the 128-bithashalgo ??
the codes generated are numbers in *hexadecimal* notation. Here are
some examples:
[]
Using the .NET SHA1Managed class I get for theinteger 45300 the following
hashcode (in *decimal* notation):

did you try to note input in octal, just to make comparison easier ?
Any ideas?

what about sense ?

Sylvain.

Hello Sylvian;

I'm absolutely new to all this; all I know is what my post clearly
states. I used the SHA1 algorythm after learning it existed on the
MSDN documentation. If it is so obvious to you what steps could be
taken to solve the problem, then why don't you suggest them instead of
replying with no content at all. If I knew what other algorithms exist
or how to test it, I would't be posting. Your post is rude and
futile.

regards,

Camilo
 
S

Sylvain

Hello Sylvian;

Hi Camilo,
I'm absolutely new to all this; all I know is what my post clearly
states. I used the SHA1 algorythm after learning it existed on the
MSDN documentation. If it is so obvious to you what steps could be
taken to solve the problem, then why don't you suggest them instead of
replying with no content at all. If I knew what other algorithms exist
or how to test it, I would't be posting. Your post is rude and
futile.

do not assume I just played a silly rude and futile game.
your own searchs on this problem were clearly insufficient and the way
to expose it, a litlle bit confusing.

you know that it could be a message digest and you're sure it's 128bit
long, a "google hash 128" will easily list: MD2, MD4, MD5 & RIPEMD128.

a more usefull question (for your as poster, not me as reader) would be:
"I'm not fluent with crypto and I need a tool (ready-to-run under a xxxx
OS) to compute some digests on int32 values" or whatever you may prefer
(I do not claim to decide for you).

the bad point is that none of the previous algo give the expected
result, so your question sums up to "hey, foo(45300) equals 93...B8,
this is foo" ?!...

in my previous reply, I did not give attention to the wide large cross
posting you made (w/o fo-up, nor mention of it), and reading your post
from m.p.p.sec, I did reply with the "rudness" of crypto. world when one
asks a nosense question w/o any effort (I don't say it's what you did).

cheers,
Sylvain.
 
J

Jacques Mostert

Well.... then you know what this mail is about..... Or, short for..... a new
encryption algorithm
developed by Jacques Francois Mostert in South Africa.

Call it RSDE-128 or Random Secure Data Encryption 128.

You won't find anything so uncrackable and un-hackable as this. Not even the
most powerfull supercomputer
network can hack it, because of a lot of factors, but not just that.... Its
because the encryption concept is new.

Mark S. use to say "Here be Dragons".

Do you know what I say ?

I say, "Here be Dragons, and for us, we are to make
them away."

RSDE is based on many years of research into popular encryption algorithms.
AES, Triple-Des...etc.

The RSDE concept is based on a secret. A secret that can only be bought.

Though, i CAN tell you who you can contact should you want a piece of the
pie.

You can contact me. I am the developer of RSDE-128.

RSDE is not limited to just 128. I have tested it with keys as large as
16384-bits.

Below you will find an example of the encryption power of RSDE-128.



128bit key:
XVkCJoXzR3GW9eyX6vReWCACiI9Chqm3lVAI3jo2znJl3twfJBzVMsQhGbOfk9MIoOGBSE12uzaiR9ao4QPBqBNuhv49DiU4u1Ip1IAGX5bLviUCkm9GEoRquzzVU

encrypted data:
TISZZB1kOBKftBqrMMlwAB6B7KAViMO9OEzn1US7JQVloCxYCFS4WlmlgZZPMW9NDxHYSSCCUo
2FKgY9CqKQCA3xdfqbVKxpeJ5JvykKW6xuWIJ77xsBP76e1miHDcEAWmIhEvSRkRo8a5G16Zy5aVfYO
7wXyKxbCTWyIy1gebXAkZpkMNp5cUZny1zk6bobddxWfaztakk6NVcVMu3l6es8ZL7gYYF8NcB3uSxKK
JgwNb7osinKl6xWhTwsFzQbO4qQ2PgrpS82KujdtMvjXDByrK3AbqsySbvR9NVEhQuNDwE7xDlVnTkpM
N57pkI3nrAvS3GcJ73xXdJu6qBtkOiG63rkvdOpV2H2qwTBN4Xsq9aHZsoKnooX3LrDXkYrj5O4RTGGcD
aIq2LY4emqerniSCXJg5NL1nComesWvYxDGkWWUgaOJYaCqny5m6r8gZFEM9mUJsyM5wVuUXDoGS7
3KeWL2eAjnfDjTvJScqidvxbSgNnu1tmGvQLOdUlfpMdnGF8jFPvGhucfKy9ny1VFd3dbwwibl4g6Z5zYZoR
6nOoUVl52hUyvhngY2TpEEHhI6oszb1kDeizhFHMU3r1UExmiraLeUrdTdgkGbolp2nbFzzxNND2jT2GrzXjS
fEE1zSuril57wPukhAMMrBuiM6aAu5lUX5hPOqNmPztAro5iJjfzdXo5HxVRLVdeRoWhHxz8rdEyW6MWSG
4vg5WQrvZUKySTd71c3LaSp4gxQfgpmcWBmYbXHqHFHIKZ7v3P8RlhJ5rrBmM2zfPncDFo3zkgpr7nkQa
t79sxZGvKzjayFDMc3kfawjrzLv4U1NY9uqhhjSle2BRNmR8p59Xd9a8nufzaubJSXJ48B4CEkUq3NiILKBU
18MO6lJJGD2rz834h8xr6HQ3Ti5aFugtKwvFmwGLUv2fIeQevmcBgIr6RszVj3YEEkdQ6an7BHwTFgD4eim
8SQcKNJiKHpFmnwqeGLPXatCbhwEfWlJYILsQ7Y1gulhgUJR2lQ8HT4klGnwqxMRsELyNpDoYS1gaGAi
aseiKwoKw2LgRnEEerWDJEg1HJ2tjDKtsbXOdAR8uS2UKb6tCuexkCrpjteGDQaBKhsX8goUWwoSt3IKx
EqEZejtHTdrJ13atOxb7havuViwqDfzLj4lbYcyNU4pX5ApTDDKFT7kTyHV2V2zhgiLzGsCaqBqCmG4YWz
WSQbLaipmEIcJvUOSCObQVSdbn12A8uZ9jslnazti2CH1uSbQRHkFWGasyy4H3Wsz8pTSqjLE4nphWroM
uzxROrqFS4KGA7BV9T4RJaVQ7B3wGWVkEAtzeV25PKLw59qcROs724LbavTjz8R4JxAfQU44t25q9hIr
u8GsrUwsqTsqCwAMYOYq8JTLGMtk8a4nf6dErX5thcIfQa2SDLGre5yzKFDsGRh5MmQiXflG2sbBL82Gb
LmeNLoGcYIL3cJilq6wehaIPzrZRQmwexPd9MmG6h6Gl15lpfCrupv326OnSMByXIRAjMpMRZLvfyytfuRJ8
So8EGssKbLKJURrRXp9Pi9Ul3E5aOygjLyns5xe37Tj6lxnEt11H4IFKwFesU8gW3srJhu2y9RKbjd2tiFh9O8
Kb8xVCCXnLwUbvKcG2AUxM5U1aVi5s3OzdgazlxaBYDmA5vUwp3xQEorGTlErzqMF42BCtd4noOI9dN
WQZgCwkNRp7mlx4iHS98gUNWxmMPjY2zOsJ2onYcXzEcIvJZRQEmAkchqVYJjdTnALjTAkQIpHYqUS
r5WP12f17DbdQrFWEjZJVY8mvQJ7joREcVNqFBhvnavioxJjVixLs5apDNdmo2

========

TO: MICROSOFT
ATT: Security Department

Dear Microsoft.

I have spoken to numerous of your staff in South Africa and all of them seem
so dumb-founded when
faced with the question on who can I contact about a business proposal. They
gave me a website I should
go to and submit my proposal. I have done so, and received a message about
"unsolicited ideas...".. To me
such a message is a smack in the face.

I will now go to your competitors and indulge them in this new concept.


Thanks for the "smack in the face"!!.

"Here be Dragons, and for us, we are to make them away."
========

And to everyone else.... I love you lots!!! Keep up the great work!!!!



Jacques, F. Mostert. - 23.
South Africa.
 
D

David Craig

The Nigerian money laundering schemes are based upon years of reseach into
the insecurity of the ACH system. There are ways to get an encryption
algorithm validated. Start with a patent. Write papers and get them
published. Have the algorithm validated by the industry. Then you might
find someone would pay to use it.

Last and foremost: Try not spamming multiple newsgroups. It only makes some
of us angry and inclined to ignore you.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Members online

Forum statistics

Threads
473,774
Messages
2,569,599
Members
45,175
Latest member
Vinay Kumar_ Nevatia
Top