~ Fun with Algorithms, Theorems, Steganography and more. ~
secondary
Code breaking seems be a challenge for many people, but not others.
Encrypted messages have been around since the beginning of time.
For example, through World War 1 and World War 2 the German military used
a cipher machine called, Enigma. The efforts by the allied forces to break
the cipher machine were immense. The Enigma messages were eventually broken.
 
 
 
 

Today, code breaking still lives on, especially in cyberspace.
DES, AES, Blowfish...are just a few examples of today's encryption schemes.
Hackers have access to many free tools e.g., John the Ripper
These free tools can break modern encryption schemes in minutes.
Below is an example of a ciphered message.
spacer
a0db9d9aa6be84e93b41a86a055e65a0
spacer
The message reads:
“Earth provides enough to satisfy every man's need, but not every man's greed”
--Mahatma Gandhi
spacer
This is a MD5 hash. Read more about breaking the md5
here
secondary
In conclusion, online communication (e.g., e-commerce) is not secure as many people think.
It is up to the online user to take proper measures to protect him or herself.
spacer
Creating your own unbreakable encryption application is one idea.
See my cipher app here .

   

Links

  2600
Derby Con
US-CERT
The Hacker News
  spacer