I need help decrypting an encrypted text (I also got cleartext examples)
-
Hi I got an Access database encrypted by an application I bought years ago and I don't have that application anymore. This application encrypted everything before saving into the database and I would like to recover some data from that DB. I am not sure but I think this algorithm needs a key and keys are saved to the database too so I got the keys. But I am not sure about the keys having a role in encryption. This algorithm produces a ciphertext which has same the same length as its cleartext. Here are some examples:
Cleartext Encrypted Key
Harita Mühendisi KXsmaX büpxfdmYm MA%7vbxWKIAgARC71+KEn8i3M4yIa+i6Zd384GWTZ6/bT+M+mKCKEFN35meeSE1OGzcxL8ukvvSeKh9c5o2bBF7vbZ+_14
ÇONA ÇkWq MA%vPz9ClelvBm24BrRcVmsXPtD7OOie8xG73DumSdNLlSaAIhL7L5uPB+Q5+titBzXRDisXC4NnnEWoESLU2VIx845_16I can provide more examples if needed but I don't think they will help. As far as I know if you encrypt a text with this algorithm and use the same key every letter means another letter. For example if you look at the first example H means K, i means m. If you want I can send you the database in private. I really need you help. Thanks.
-
:D I'm aware that it's complicated.
-
:D I'm aware that it's complicated.
SimpleData wrote:
I'm aware that it's complicated.
I think that may be an understatement. In order to decrypt the data you will at the least need to know the algorithm that was used to encrypt it. Added to that the encryption may have been done with a key that the user has to enter (similar to entering a password). Without these elements I think you may be facing an uphill struggle.
-
SimpleData wrote:
I'm aware that it's complicated.
I think that may be an understatement. In order to decrypt the data you will at the least need to know the algorithm that was used to encrypt it. Added to that the encryption may have been done with a key that the user has to enter (similar to entering a password). Without these elements I think you may be facing an uphill struggle.
I don't know which encryption algorithm used to encrypt it but I thought that someone here might recognize the output and tell me which algorithm may have been used. Maybe someone could see a pattern etc. I am sure that no password is needed while encrypting. Only this random key may have been used.
-
I don't know which encryption algorithm used to encrypt it but I thought that someone here might recognize the output and tell me which algorithm may have been used. Maybe someone could see a pattern etc. I am sure that no password is needed while encrypting. Only this random key may have been used.
The whole ethos of encryption is that it should be impossible to decrypt the data just by looking at the encrypted characters. What is the point of encrypting secure information if anyone can decrypt it just by looking at it? Do you have the original program that did the encryption, or access to the people who wrote it?
SimpleData wrote:
I am sure that no password is needed while encrypting. Only this random key may have been used.
I don't think that encrypting with a random key would be a good idea!
-
The whole ethos of encryption is that it should be impossible to decrypt the data just by looking at the encrypted characters. What is the point of encrypting secure information if anyone can decrypt it just by looking at it? Do you have the original program that did the encryption, or access to the people who wrote it?
SimpleData wrote:
I am sure that no password is needed while encrypting. Only this random key may have been used.
I don't think that encrypting with a random key would be a good idea!
I don't have the application encrypted it all I have is this database right now so I can't reverse engineer it. It is not a well coded application actually and I don't think that it's really secure. I wasn't talking about just looking at the encrypted text and solving it from your mind, maybe something may catch to your eye. Like realizing something was encoded with Base64 just by looking. Random key for each raw is included in the database.
-
Hi I got an Access database encrypted by an application I bought years ago and I don't have that application anymore. This application encrypted everything before saving into the database and I would like to recover some data from that DB. I am not sure but I think this algorithm needs a key and keys are saved to the database too so I got the keys. But I am not sure about the keys having a role in encryption. This algorithm produces a ciphertext which has same the same length as its cleartext. Here are some examples:
Cleartext Encrypted Key
Harita Mühendisi KXsmaX büpxfdmYm MA%7vbxWKIAgARC71+KEn8i3M4yIa+i6Zd384GWTZ6/bT+M+mKCKEFN35meeSE1OGzcxL8ukvvSeKh9c5o2bBF7vbZ+_14
ÇONA ÇkWq MA%vPz9ClelvBm24BrRcVmsXPtD7OOie8xG73DumSdNLlSaAIhL7L5uPB+Q5+titBzXRDisXC4NnnEWoESLU2VIx845_16I can provide more examples if needed but I don't think they will help. As far as I know if you encrypt a text with this algorithm and use the same key every letter means another letter. For example if you look at the first example H means K, i means m. If you want I can send you the database in private. I really need you help. Thanks.
A few observations: -1- Decoding an encrypted message without the key or algorithm will in general be hard enough that nobody's going to want to bother if they're not getting paid. -2- If the encryption algorithm is decent, decoding will essentially be impossible. -3- This particular algorithm doesn't seem very good. -4- Cleartext characters outside the range [A-Za-z] are unchanged. -5- There seems to be a 1:1 correlation between cleartext characters and encrypted characters. For example, in the first line, both "a"'s map to "X" and all of the "i"'s map to "m". -6- The key appears to be base64 encoded. Running the portion between the "%" and the "_" through a base64 decoder may make clear what it represents. Probably a translation table.
-
A few observations: -1- Decoding an encrypted message without the key or algorithm will in general be hard enough that nobody's going to want to bother if they're not getting paid. -2- If the encryption algorithm is decent, decoding will essentially be impossible. -3- This particular algorithm doesn't seem very good. -4- Cleartext characters outside the range [A-Za-z] are unchanged. -5- There seems to be a 1:1 correlation between cleartext characters and encrypted characters. For example, in the first line, both "a"'s map to "X" and all of the "i"'s map to "m". -6- The key appears to be base64 encoded. Running the portion between the "%" and the "_" through a base64 decoder may make clear what it represents. Probably a translation table.
In another words it looks like a ceasar's cipher, and my guess is that the number after "_" indicates the alphabetical shift or something, and the characters between % and _ represents the "replacment alphabet" somhow. And if it is indeed a ceasar's chiper it looks lika a copy-pasta job, since its range is a-Z and skipps your countrys special characters.
modified on Tuesday, September 1, 2009 3:41 AM
-
In another words it looks like a ceasar's cipher, and my guess is that the number after "_" indicates the alphabetical shift or something, and the characters between % and _ represents the "replacment alphabet" somhow. And if it is indeed a ceasar's chiper it looks lika a copy-pasta job, since its range is a-Z and skipps your countrys special characters.
modified on Tuesday, September 1, 2009 3:41 AM
Thank you for really useful tips. If I try to decode everything between % and _ I get meaningless text. I know ceasar's cipher because I've read Digital Fortress :D. This algorithm also changes numbers. I couldn't include a number example but it does. I think we've made progress, we will solve this. :)
-
Hi I got an Access database encrypted by an application I bought years ago and I don't have that application anymore. This application encrypted everything before saving into the database and I would like to recover some data from that DB. I am not sure but I think this algorithm needs a key and keys are saved to the database too so I got the keys. But I am not sure about the keys having a role in encryption. This algorithm produces a ciphertext which has same the same length as its cleartext. Here are some examples:
Cleartext Encrypted Key
Harita Mühendisi KXsmaX büpxfdmYm MA%7vbxWKIAgARC71+KEn8i3M4yIa+i6Zd384GWTZ6/bT+M+mKCKEFN35meeSE1OGzcxL8ukvvSeKh9c5o2bBF7vbZ+_14
ÇONA ÇkWq MA%vPz9ClelvBm24BrRcVmsXPtD7OOie8xG73DumSdNLlSaAIhL7L5uPB+Q5+titBzXRDisXC4NnnEWoESLU2VIx845_16I can provide more examples if needed but I don't think they will help. As far as I know if you encrypt a text with this algorithm and use the same key every letter means another letter. For example if you look at the first example H means K, i means m. If you want I can send you the database in private. I really need you help. Thanks.
Have you by any chance tried the common Algoprithms? Blowfish, Catfish etc?
BHM
-
Have you by any chance tried the common Algoprithms? Blowfish, Catfish etc?
BHM
No.