Christian Tschabuschnig wrote:
> 
> 
> John Lenz wrote:
>> You could write your script to first build a database of the encryption
>> of the text <?xml using all the different passwords in your list.  Then,
>> you just need to do a binary search for the first few bytes of the
>> encrypted text.
> 
> isn't the "<?xml" compressed by zlib in the original data-file before
> getting encrypted?
> 
Yes, you are correct.  Sorry.  The attack should still be feasable
depending on the zlib algorithm (which I am not familiar with)

John

Reply via email to