JD wrote:
> 
> Does anybody got fresh ideas ?

Hmmm, we should drop the child plays and start coding some real tools to
perform a serious analysis of the binaries we've got by now...

Information Entropy: http://en.wikipedia.org/wiki/Information_entropy
Coincidence Index: http://en.wikipedia.org/wiki/Index_of_coincidence
Differential Cryptanalysis:
http://en.wikipedia.org/wiki/Differential_cryptanalysis

For more, see: http://en.wikipedia.org/wiki/Category:Cryptographic_attacks

And trying to find some cribs
(http://en.wikipedia.org/wiki/Crib_%28cryptanalysis%29) would help.

Note: Performing a XOR on the two binaries would reveal a mask of
unchanged locations (the XOR function will be on hexadecimal digits
meaning a XOR b = (a!=b)?1:0. All the zeroed area will be unchanged
while oned area will be modified).

That's all folks!
-- 
Emmanuel Fleury              | Room:  261
Associate Professor,         | Phone: +33 (0)5 40 00 69 34
LaBRI, Domaine Universitaire | Fax:   +33 (0)5 40 00 66 69
351, Cours de la Libération  | Email: [EMAIL PROTECTED]
33405 Talence Cedex, France  | URL:   http://www.labri.fr/~fleury

_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to