Topic: "Crypto recognition" (page 1 of 1)

1
Author Post
bb
groupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmaster
Does anyone know of any good resources to quickly identify which crypto has been used from either the hash or the method.

For example, if you saw a 32chr hash with only 0-9a-f in it - chances are it is MD5. If it was 40 chrs it could be SHA1.

If you see a routine that contains a certain order of instructions then you are able to identify it.

For those of you that are good at crypto, you recognise these things straight away ... so I was wondering if there was a 'cheat sheet' that you could use to help narrow down a particular hash/routine by highlighting particular code sequences or hash characteristics?

I hope thats clear ... :S

bb
private message Website
occasus
groupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmaster
If I understood you good enough then here is my explanation (even if I am not good in crypto):

1) I look at the lenght of the hash value.
2) Then I divide this number by two (cause I think they are hexadecimal values).
3) The output number is then moltiplied by 8 (because of 8 bit each value).
4) Then we have the kind of hashing.
5) Then google :)

Example:

1) a hash is made by 32 chars
2) divided by 2 = 16
3) 16 times 8 = 128
4) the hash method is a 128bit encryption
5) now I search in google for possible algorythms

Dunno if this is the answer to your question.
If I made a mistake in thinking or writing please tell me ;) thx.
private message Website
bb
groupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmastergroupmaster
Thats great! That is the sort of thing I am looking for :)

From my limited knowledge, I recognise MD5 and SHA1 and eventually I normally recognise BASE64 as it contains the weirder characters =/etc

Whilst I realise there is no 'cheat sheet' as such (:p) but I figured that there should be identifying factors to point you in the direction of which hash it is that you are looking for - either by hash format or some distinctive series of commands that relate to a specific cipher.

Cheers
bb
private message Website

Topic: "Crypto recognition" (page 1 of 1)

1