JD wrote: > > Does anybody got fresh ideas ? Hmmm, we should drop the child plays and start coding some real tools to perform a serious analysis of the binaries we've got by now...
Information Entropy: http://en.wikipedia.org/wiki/Information_entropy Coincidence Index: http://en.wikipedia.org/wiki/Index_of_coincidence Differential Cryptanalysis: http://en.wikipedia.org/wiki/Differential_cryptanalysis For more, see: http://en.wikipedia.org/wiki/Category:Cryptographic_attacks And trying to find some cribs (http://en.wikipedia.org/wiki/Crib_%28cryptanalysis%29) would help. Note: Performing a XOR on the two binaries would reveal a mask of unchanged locations (the XOR function will be on hexadecimal digits meaning a XOR b = (a!=b)?1:0. All the zeroed area will be unchanged while oned area will be modified). That's all folks! -- Emmanuel Fleury | Room: 261 Associate Professor, | Phone: +33 (0)5 40 00 69 34 LaBRI, Domaine Universitaire | Fax: +33 (0)5 40 00 66 69 351, Cours de la Libération | Email: [EMAIL PROTECTED] 33405 Talence Cedex, France | URL: http://www.labri.fr/~fleury _______________________________________________ Linux4nano-dev mailing list [email protected] https://mail.gna.org/listinfo/linux4nano-dev http://www.linux4nano.org
