Christian Tschabuschnig wrote:
> John Lenz wrote:
>> You could write your script to first build a database of the encryption
>> of the text <?xml using all the different passwords in your list.  Then,
>> you just need to do a binary search for the first few bytes of the
>> encrypted text.
> isn't the "<?xml" compressed by zlib in the original data-file before
> getting encrypted?
Yes, you are correct.  Sorry.  The attack should still be feasable
depending on the zlib algorithm (which I am not familiar with)


Reply via email to