Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. General Programming
  3. Algorithms
  4. I need help decrypting an encrypted text (I also got cleartext examples)

I need help decrypting an encrypted text (I also got cleartext examples)

Scheduled Pinned Locked Moved Algorithms
databasealgorithmssecurityhelptutorial
12 Posts 5 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S SimpleData

    Hi I got an Access database encrypted by an application I bought years ago and I don't have that application anymore. This application encrypted everything before saving into the database and I would like to recover some data from that DB. I am not sure but I think this algorithm needs a key and keys are saved to the database too so I got the keys. But I am not sure about the keys having a role in encryption. This algorithm produces a ciphertext which has same the same length as its cleartext. Here are some examples:

    Cleartext Encrypted Key
    Harita Mühendisi KXsmaX büpxfdmYm MA%7vbxWKIAgARC71+KEn8i3M4yIa+i6Zd384GWTZ6/bT+M+mKCKEFN35meeSE1OGzcxL8ukvvSeKh9c5o2bBF7vbZ+_14
    ÇONA ÇkWq MA%vPz9ClelvBm24BrRcVmsXPtD7OOie8xG73DumSdNLlSaAIhL7L5uPB+Q5+titBzXRDisXC4NnnEWoESLU2VIx845_16

    I can provide more examples if needed but I don't think they will help. As far as I know if you encrypt a text with this algorithm and use the same key every letter means another letter. For example if you look at the first example H means K, i means m. If you want I can send you the database in private. I really need you help. Thanks.

    A Offline
    A Offline
    annathor
    wrote on last edited by
    #2

    Only jones can help you, tell them that spider sent you.

    S 1 Reply Last reply
    0
    • A annathor

      Only jones can help you, tell them that spider sent you.

      S Offline
      S Offline
      SimpleData
      wrote on last edited by
      #3

      :D I'm aware that it's complicated.

      L 1 Reply Last reply
      0
      • S SimpleData

        :D I'm aware that it's complicated.

        L Offline
        L Offline
        Lost User
        wrote on last edited by
        #4

        SimpleData wrote:

        I'm aware that it's complicated.

        I think that may be an understatement. In order to decrypt the data you will at the least need to know the algorithm that was used to encrypt it. Added to that the encryption may have been done with a key that the user has to enter (similar to entering a password). Without these elements I think you may be facing an uphill struggle.

        S 1 Reply Last reply
        0
        • L Lost User

          SimpleData wrote:

          I'm aware that it's complicated.

          I think that may be an understatement. In order to decrypt the data you will at the least need to know the algorithm that was used to encrypt it. Added to that the encryption may have been done with a key that the user has to enter (similar to entering a password). Without these elements I think you may be facing an uphill struggle.

          S Offline
          S Offline
          SimpleData
          wrote on last edited by
          #5

          I don't know which encryption algorithm used to encrypt it but I thought that someone here might recognize the output and tell me which algorithm may have been used. Maybe someone could see a pattern etc. I am sure that no password is needed while encrypting. Only this random key may have been used.

          L 1 Reply Last reply
          0
          • S SimpleData

            I don't know which encryption algorithm used to encrypt it but I thought that someone here might recognize the output and tell me which algorithm may have been used. Maybe someone could see a pattern etc. I am sure that no password is needed while encrypting. Only this random key may have been used.

            L Offline
            L Offline
            Lost User
            wrote on last edited by
            #6

            The whole ethos of encryption is that it should be impossible to decrypt the data just by looking at the encrypted characters. What is the point of encrypting secure information if anyone can decrypt it just by looking at it? Do you have the original program that did the encryption, or access to the people who wrote it?

            SimpleData wrote:

            I am sure that no password is needed while encrypting. Only this random key may have been used.

            I don't think that encrypting with a random key would be a good idea!

            S 1 Reply Last reply
            0
            • L Lost User

              The whole ethos of encryption is that it should be impossible to decrypt the data just by looking at the encrypted characters. What is the point of encrypting secure information if anyone can decrypt it just by looking at it? Do you have the original program that did the encryption, or access to the people who wrote it?

              SimpleData wrote:

              I am sure that no password is needed while encrypting. Only this random key may have been used.

              I don't think that encrypting with a random key would be a good idea!

              S Offline
              S Offline
              SimpleData
              wrote on last edited by
              #7

              I don't have the application encrypted it all I have is this database right now so I can't reverse engineer it. It is not a well coded application actually and I don't think that it's really secure. I wasn't talking about just looking at the encrypted text and solving it from your mind, maybe something may catch to your eye. Like realizing something was encoded with Base64 just by looking. Random key for each raw is included in the database.

              1 Reply Last reply
              0
              • S SimpleData

                Hi I got an Access database encrypted by an application I bought years ago and I don't have that application anymore. This application encrypted everything before saving into the database and I would like to recover some data from that DB. I am not sure but I think this algorithm needs a key and keys are saved to the database too so I got the keys. But I am not sure about the keys having a role in encryption. This algorithm produces a ciphertext which has same the same length as its cleartext. Here are some examples:

                Cleartext Encrypted Key
                Harita Mühendisi KXsmaX büpxfdmYm MA%7vbxWKIAgARC71+KEn8i3M4yIa+i6Zd384GWTZ6/bT+M+mKCKEFN35meeSE1OGzcxL8ukvvSeKh9c5o2bBF7vbZ+_14
                ÇONA ÇkWq MA%vPz9ClelvBm24BrRcVmsXPtD7OOie8xG73DumSdNLlSaAIhL7L5uPB+Q5+titBzXRDisXC4NnnEWoESLU2VIx845_16

                I can provide more examples if needed but I don't think they will help. As far as I know if you encrypt a text with this algorithm and use the same key every letter means another letter. For example if you look at the first example H means K, i means m. If you want I can send you the database in private. I really need you help. Thanks.

                S Offline
                S Offline
                supercat9
                wrote on last edited by
                #8

                A few observations: -1- Decoding an encrypted message without the key or algorithm will in general be hard enough that nobody's going to want to bother if they're not getting paid. -2- If the encryption algorithm is decent, decoding will essentially be impossible. -3- This particular algorithm doesn't seem very good. -4- Cleartext characters outside the range [A-Za-z] are unchanged. -5- There seems to be a 1:1 correlation between cleartext characters and encrypted characters. For example, in the first line, both "a"'s map to "X" and all of the "i"'s map to "m". -6- The key appears to be base64 encoded. Running the portion between the "%" and the "_" through a base64 decoder may make clear what it represents. Probably a translation table.

                A 1 Reply Last reply
                0
                • S supercat9

                  A few observations: -1- Decoding an encrypted message without the key or algorithm will in general be hard enough that nobody's going to want to bother if they're not getting paid. -2- If the encryption algorithm is decent, decoding will essentially be impossible. -3- This particular algorithm doesn't seem very good. -4- Cleartext characters outside the range [A-Za-z] are unchanged. -5- There seems to be a 1:1 correlation between cleartext characters and encrypted characters. For example, in the first line, both "a"'s map to "X" and all of the "i"'s map to "m". -6- The key appears to be base64 encoded. Running the portion between the "%" and the "_" through a base64 decoder may make clear what it represents. Probably a translation table.

                  A Offline
                  A Offline
                  annathor
                  wrote on last edited by
                  #9

                  In another words it looks like a ceasar's cipher, and my guess is that the number after "_" indicates the alphabetical shift or something, and the characters between % and _ represents the "replacment alphabet" somhow. And if it is indeed a ceasar's chiper it looks lika a copy-pasta job, since its range is a-Z and skipps your countrys special characters.

                  modified on Tuesday, September 1, 2009 3:41 AM

                  S 1 Reply Last reply
                  0
                  • A annathor

                    In another words it looks like a ceasar's cipher, and my guess is that the number after "_" indicates the alphabetical shift or something, and the characters between % and _ represents the "replacment alphabet" somhow. And if it is indeed a ceasar's chiper it looks lika a copy-pasta job, since its range is a-Z and skipps your countrys special characters.

                    modified on Tuesday, September 1, 2009 3:41 AM

                    S Offline
                    S Offline
                    SimpleData
                    wrote on last edited by
                    #10

                    Thank you for really useful tips. If I try to decode everything between % and _ I get meaningless text. I know ceasar's cipher because I've read Digital Fortress :D. This algorithm also changes numbers. I couldn't include a number example but it does. I think we've made progress, we will solve this. :)

                    1 Reply Last reply
                    0
                    • S SimpleData

                      Hi I got an Access database encrypted by an application I bought years ago and I don't have that application anymore. This application encrypted everything before saving into the database and I would like to recover some data from that DB. I am not sure but I think this algorithm needs a key and keys are saved to the database too so I got the keys. But I am not sure about the keys having a role in encryption. This algorithm produces a ciphertext which has same the same length as its cleartext. Here are some examples:

                      Cleartext Encrypted Key
                      Harita Mühendisi KXsmaX büpxfdmYm MA%7vbxWKIAgARC71+KEn8i3M4yIa+i6Zd384GWTZ6/bT+M+mKCKEFN35meeSE1OGzcxL8ukvvSeKh9c5o2bBF7vbZ+_14
                      ÇONA ÇkWq MA%vPz9ClelvBm24BrRcVmsXPtD7OOie8xG73DumSdNLlSaAIhL7L5uPB+Q5+titBzXRDisXC4NnnEWoESLU2VIx845_16

                      I can provide more examples if needed but I don't think they will help. As far as I know if you encrypt a text with this algorithm and use the same key every letter means another letter. For example if you look at the first example H means K, i means m. If you want I can send you the database in private. I really need you help. Thanks.

                      M Offline
                      M Offline
                      mbyamukama
                      wrote on last edited by
                      #11

                      Have you by any chance tried the common Algoprithms? Blowfish, Catfish etc?

                      BHM

                      S 1 Reply Last reply
                      0
                      • M mbyamukama

                        Have you by any chance tried the common Algoprithms? Blowfish, Catfish etc?

                        BHM

                        S Offline
                        S Offline
                        SimpleData
                        wrote on last edited by
                        #12

                        No.

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups