yeah just could not figure which hash but then again maybe it was salted with the public key but was fun think it over now will need to read up on some tools that could make life easier haha was googling like a beast.
an un-reversible hash is very unlikely. It was solved too quickly for that. I was trying some symmetric encryption methods but failed to do it on time.
md5 sha etc I imagine could work lol one point I thought heck maybe it is a base64 image haha but no real luck just end up with more nonsense, I thought ok maybe a cypher eliminate number that appears in the name or something that if you had the public key it could work. Going to google symmetric encryption :) I just kept to the ones I know we get used for passwords mostly etc. too basic but damn just want to know the answer now lol
Hash is irreversible. It's like an engine that makes a pulp with the input. If you have the input, it's obvious the pulp came from it, but if you don't, it's impossible to go back and trace where it came from. The only way to reverse md5 and sha256 and all those is to have a database of what input comes from each mashed pulp (individually).
For public-key encryption, let's say Alice wants to send a message to Bob. Alice grabs Bob's public key and encrypts it. Bob grabs his own (secret) private key and that key is the only key that can decrypt a message encrypted with his public key.
Symmetric simply means that the same key is used to encrypt and decrypt a message.
So, hash is irreversible. Asymmetric usually needs a private key that is in code (private keys in PGP have like 6 lines and more) and symmetric encryption is the easiest one because most of the time it can be done with a simple password.
Yes, I see, I remember the only way to change a password was to generate a new, mmm I think what I mean is maybe convert? But can see how when it comes to the hashes I wasted time. thank you for the tip!
Yeah, you're right. If you only store the salted hash (as you should), the only way to change a password is to generate a new one. What do you mean convert?
convert, encode. sorry I use them interchangeably.
could still have used a hash just with multiple passes since the same string will always give the same md5, obviously, I did not consider text length or anything from the resulting strings so basically, a deer caught in headlights. lol. I did, however, know that 4c needs to be a 5. Or I see from his supposed solve it is a reverse then something called ROT13 so that last letter needs to become a 5 ... anyway sorry to confuse I kinda jump from one thing to the next until I can see how pieces fit always 50% sure this is not even the piece for the puzzle haha
yeah just could not figure which hash but then again maybe it was salted with the public key but was fun think it over now will need to read up on some tools that could make life easier haha was googling like a beast.
an un-reversible hash is very unlikely. It was solved too quickly for that. I was trying some symmetric encryption methods but failed to do it on time.
md5 sha etc I imagine could work lol one point I thought heck maybe it is a base64 image haha but no real luck just end up with more nonsense, I thought ok maybe a cypher eliminate number that appears in the name or something that if you had the public key it could work. Going to google symmetric encryption :) I just kept to the ones I know we get used for passwords mostly etc. too basic but damn just want to know the answer now lol
Hash is irreversible. It's like an engine that makes a pulp with the input. If you have the input, it's obvious the pulp came from it, but if you don't, it's impossible to go back and trace where it came from. The only way to reverse md5 and sha256 and all those is to have a database of what input comes from each mashed pulp (individually).
For public-key encryption, let's say Alice wants to send a message to Bob. Alice grabs Bob's public key and encrypts it. Bob grabs his own (secret) private key and that key is the only key that can decrypt a message encrypted with his public key.
Symmetric simply means that the same key is used to encrypt and decrypt a message.
So, hash is irreversible. Asymmetric usually needs a private key that is in code (private keys in PGP have like 6 lines and more) and symmetric encryption is the easiest one because most of the time it can be done with a simple password.
Yes, I see, I remember the only way to change a password was to generate a new, mmm I think what I mean is maybe convert? But can see how when it comes to the hashes I wasted time. thank you for the tip!
Yeah, you're right. If you only store the salted hash (as you should), the only way to change a password is to generate a new one. What do you mean convert?
convert, encode. sorry I use them interchangeably.
could still have used a hash just with multiple passes since the same string will always give the same md5, obviously, I did not consider text length or anything from the resulting strings so basically, a deer caught in headlights. lol. I did, however, know that 4c needs to be a 5. Or I see from his supposed solve it is a reverse then something called ROT13 so that last letter needs to become a 5 ... anyway sorry to confuse I kinda jump from one thing to the next until I can see how pieces fit always 50% sure this is not even the piece for the puzzle haha
Hi @cryptosharon! You have received 0.1 SBD tip from @penderis!
Check out @penderis blog here and follow if you like the content :)
@tipU voting service | For investors.