Crypto algorithm identification (reverse engineering)

Published: 14/11/2017
Crypto algorithm identification (reverse engineering)
Source: CRYPTO.STACKEXCHANGE.COM

I'm trying to identify a certain cryptographic algorithm used in a program. From examining the executable, it appears it Has 16 rounds (plus 2 "rounds" for pre/post processing) Pads the input plaintext to 256 bytes with the results of a linear congruence generator (with a fixed seed). This might be a preprocessing step and not part of the actual crypto algorithm Each round operates on the entir

Read more
Related news
Comment