Text converters

#1

Mak 2.0

Mod...WAFFLES!?!?
Staff member
#2
There is also Translator that is a Firefox extension.

It can change into many languages.
 
#3
kool, i might look into it.
 

mqudsi

Mostly Harmless
Staff member
#4
Whatever that is, it's not Arabic...
 
#5
oh :frowning: ok it said it was oh well

i still have AES!

(key == neo)
fx2vORkBITAhITAhLYoRyCNaVpGhsRl03iExMCHAXNgtj1dbD0l9hSAYzV5A/5uwcy1O7Q==
 
Last edited:

Sarge

Active Member
#6
oh :frowning: ok it said it was oh well

i still have AES!

(key == neo)
fx2vORkBITAhITAhLYoRyCNaVpGhsRl03iExMCHAXNgtj1dbD0l9hSAYzV5A/5uwcy1O7Q==
I think thats how you make your life complicated :tongueout:
 
#7
its an encyption method Sarge ^_^
 

Terry60

Knows where his towel is.
Staff member
#8
#10
aligator, it isnt gibberish :tongueout:

try finding a decoder for AES or download the Leet Key firefox extension and decode this:

fx2vORkBITAhITAhLYoRyCNaVpGhsRl03iExMCHAXNgtj1dbD0l9hSAYzV5A/5uwcy1O7Q==

with the key: neo

---

Another in AES: (the key is still neo)

dCExMSFQQxkBITAhITAhLbi+1CowWWoVITExIZDsHmiemAEtfMlre8GhIBB89EEeBhpl9i0x3+GK
4SExMyE7gsNcBzsOi4AjLSEwIfA=
 

mqudsi

Mostly Harmless
Staff member
#11
Ali, AES is a private-key symmetric encryption standard. It takes some data and then modifies it so that it can only be read again if the reader has the password.
 
#13
its much better encryption method then DES

AES message with the password/key as neo:
1u42RBkBITAhITAhLfCilKRTvmOd9dz3PPchMCFiWC30cG5V2tXAopsHOePzRs79LZF3eMA=

same message and password/key in DES:
aetsa2Yea7thuGDpn2XsXXx08puGY1/HcmFiQYSNZS8xa1N2zrd54Q==

AES: Advanced Encryption Standard - Wikipedia, the free encyclopedia
DES: Data Encryption Standard - Wikipedia, the free encyclopedia

Its used mainly in security, networks and email. i did a project on it for a class last semester (which i had known about for a couple years before then)

DES is lamo compared to AES ^_^

and everything is crackable Aligator, given enough time and money and movitation.
 
Last edited:

Terry60

Knows where his towel is.
Staff member
#14
Not quite everything ! The "one time pad" is still uncrackable as a cypher. It can only be compromised by physical capture of the pad, but it's not a practical encryption technique for parties who cannot physically meet.
Ideal though for an agent sent into the field, who is given the one of the unique pair of pads for communication with the holder of the other.
 
#15
^ oh okay

idk everything about encryption but i like learning new things about them ^_^ thanks
 
#16
Terry are you sure you didnt work as a secret agent before???
You seem to know alot about these things. :wink:
 

Terry60

Knows where his towel is.
Staff member
#17
I read David Kahn's "The Codebreakers" (all 2000+ pages) years ago, and recently found James Rusbridger's "Betrayal at Pearl Harbour", which contradicts some of Kahn's book with later info, and claims (with a lot of documented evidence) that UK knew of Japanese intentions, but that Churchill kept it quiet from the US because he wanted them in the war. He also claims that the US had all the same info and capability, but failed to put it together because, unlike the highly integrated British system, they were split by army/navy and inter-agency rivalry and hostility; and that evidence of their culpability has been systematically expunged from the records (but not successfully enough).
Cryptanalysis, because of its strong ties with world politics and history, makes fascinating reading.
Any of you with an interest might like to know that Kahn also contains the full uncracked cypher for a legendary unfound hoard of treasure somewhere near Roanoak Virginia. Do you want to be seriously rich ?
 

mqudsi

Mostly Harmless
Staff member
#18
Hmmmm... I'd assume modern super-computers should be able to unravel that particular mystery without too much trouble?
 

Terry60

Knows where his towel is.
Staff member
#19
The problem in the Roanoak case is finding the key. It's a bit like the one-time pad, in that the document is half decrypted, using a particular book as the encryption key, but the same book doesn't work for the second half of the message.
What people have been trying to do for centuries, is find what book or document was used as the key for the second half. (Of course, it could always be that the writer was perpetrating a joke on future generations of treasure hunters, and the second half is just jibberish. "the location of the fabulous hoard of gold and jewels, we hid near Roanoak in the state of Virginia, buried under a bush which you can find by nkauh ln flk lalkl. kauyuyrel., jf;; hjsgujkfkjy kfhperty.zgi jlkkd kk ckka kljk j" or then again - It might just be there !)