Page 3 of 3 FirstFirst 123
Results 21 to 24 of 24
  1. #21
    Join Date
    Jun 2006
    Posts
    4,832
    Tokens
    0

    Latest Awards:

    Default

    Quote Originally Posted by 01101101entor View Post
    My god, some of you are stupid. Geek appears to be the only one here with a clue what hes on about.

    Ok, let me exsplain. On a computer we encode data. Aka data is reprisnted in binary form, be it ascii for text, or by any other means, for images, sound, video or what ever else.
    Encription, is then when we put data in to a form when its not readable.

    Say we do a simple ceaser encription

    Hello People << normal

    ifmmp qfpqmf <<encripted.

    Decription then works by doing the encription backwards, aka we shift it to the left as opposed to the right. Hence we get back are orignal unencripted text "Hello People"

    Very easy.

    Md5 though is NOT an encription, it is a fixed lengh one way hash. Since its not encripted, it cant be decripted. Since its a one way hash, it cant be worked out by any other way.

    You can only decript something thats Encripted. Since md5 isnt incripted YOU CAN NOT DECRIPT IT.
    A hash table may be able to work out the orignal text from an md5 hash, but not by decripting it, by looking it up. as decription is still impossible. Since it was never encripted to start with.

    futher reading..
    http://en.wikipedia.org/wiki/MD5
    http://www.reference.com/browse/wiki/MD5
    http://www.answers.com/topic/md5
    http://www.renewdata.com/hash-values.php

    NO stop makeing yourslef look like ******s, get a clue, and stop saying such moronic things on a subject you obvuosly know abosulty nothing about.
    Hmm, ok. But bruteforcers will bruteforce it so it makes the work again. Not actual decryption?

  2. #22
    Join Date
    Aug 2004
    Location
    UK
    Posts
    11,283
    Tokens
    2,031

    Latest Awards:

    Default

    Brute forces dont do anything like encription? they just slowly go threw every possible password (unless decitonary attack in whihc its a list of common passwords) which are just hashes and tested against the pass until it finds one that works. Same as brute forceing anything. But its slow and would take years often to get a pw of lengh.

  3. #23
    Join Date
    Oct 2005
    Location
    Melbourne, Australia
    Posts
    7,554
    Tokens
    0

    Latest Awards:

    Default

    can you DEHASH a md5 hash then?!

  4. #24
    Join Date
    Oct 2005
    Posts
    401
    Tokens
    0

    Default

    If you read any of that youd know you cant just use a table of known words md5ed and comapred to your hash or bruteforcing going through all there is.
    Musicicon is
    currently

Page 3 of 3 FirstFirst 123

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •