Previous Page | Next Page

by placedo at 11:57 AM EST on November 23, 2010
it doesn't work like that, it's AES encryption & the point of AES is even if you have a decrypted & encrypted file, & compare the two, there is no way or being able to use any of that information to find the original key, that's the point of AES & why people are using it more & more
by arbingordon at 2:38 PM EST on November 23, 2010
And you're sure of that?
You're sure that AES cannot be bruteforced?
Or are you just saying that one cannot derive the key by nominally comparing the two files to "find" the key that way?
(in which case, that is not what Blosk was saying, so read his post again until you understand what he said)
by hcs at 4:48 PM EST on November 23, 2010
Brute force on AES is 2^128 (or 192 or 256 for those key sizes). As far as I know (not being a cryptographic expert) there is no known plaintext attack on it that is any better, so having the full plaintext isn't helpful.
by placedo at 4:41 AM EST on November 25, 2010
@arbingordon, to answer the original question brute force is possible on AES (it's possible on anything given the time!), but realistically you're looking at maybe hundred's (maybe more) year's of waiting for it to throw something back at you, & that's with a few computer's constantly looking & assuming you don't have anything like Power Cuts down the line, so brute force is not really the way to go at this moment.
by hcs at 10:47 AM EST on November 25, 2010
One could make the argument that trying all key-sized strings in the entire ISO would be completely feasible, but I am certain that they would not simply store the key in plain sight.
by wolupgm6 at 10:05 AM EST on December 30, 2010
Leave balls out of this! Seems that Rockband 3's release did nothing to help this issue.
by bxaimc at 12:37 PM EST on December 30, 2010
well.....duh
by wolupgm6 at 9:27 AM EST on December 31, 2010
Shh. I wanted to make my shameless bump look like less of a shameless bump <_<
by mudlord at 1:28 AM EST on January 1, 2011
And the situation is still the same:

No truly effective cryptographic attack exists. Only attack that would be successful is if you find a flaw in the implementation of AES in the host product.
hope by hexen at 5:30 AM EDT on April 20, 2011
hi friends!

it seems to me that Chinese Democracy provided here wasn't actually decrypted but instead created via xbox track isolation method re-record (so it should have some dec->enc conversion flaws). I judge by it's structure: it doesnt contain 0A header, it has different libvorbis version (much newer one) and it has some typical tags (ARTIST, etc) - RB2 moggs don't have them.

But i found another post-jan2009 mogg that may be decrypted honestly: Guns n Roses prostitute.mogg. Structure very same to that in regular RB2 files, it has 0A header and even "Xiph.Org libVorbis I 20050304" substring. I can send it to email if anyone needs.

to date it's the only one i cold found, but it gives hope that decryption at least possible. I tried to search for a guy who did this but failed =(

Previous Page | Next Page
Go to Page 0 1 2 3 4 5

Search this thread

Show all threads

Reply to this thread:

User Name Tags:

bold: [b]bold[/b]
italics: [i]italics[/i]
emphasis: [em]emphasis[/em]
underline: [u]underline[/u]
small: [small]small[/small]
Link: [url=http://www.google.com]Link[/url]

[img=https://www.hcs64.com/images/mm1.png]
Password
Subject
Message

HCS Forum Index
Halley's Comet Software
forum source