Re: Kryptonite v2.0 Now Available!
- Posted by Robert Pilkington <pilking at BELLATLANTIC.NET> Dec 30, 1998
- 460 views
>* It uses a hash algorithm to detect tampered files and avoids bad >decrypts. Are you sure that's a good idea? Watch this (using my encryption program, not released.) C:\TEXT>encrypt secure.txt secure.enc Encrypt 1.0 by Robert Brandon Pilkington [E]ncrypt or [D]ecrypt? e Input password: **** Retype password: **** Encrypting... 100% done! C:\TEXT>encrypt secure.txt secure2.enc Encrypt 1.0 by Robert Brandon Pilkington [E]ncrypt or [D]ecrypt? d Input password: ***** Retype password: ***** Decrypting... 100% done! Now, secure2.enc is more secure than secure.enc. To decode it, you have to encrypt it with the decryption password, and decrypt it using the encryption password. Pretty sneaky, the text (or binary, whatever) would be even more mangled, but still repairable. What do you think?