下面是一段经过经典密码算法加密的密文(加密算法未知):

yvvnerujjvnywhbdvkpchfgvjtzwqsuporqfzpoekkjgziicdwwkeejdsruef

 

whwseyejejhnaeepjbjwnuztavjswrthswlcdxqrnoclsodkrrfjtfhlfznbx

 

wyvdwdcwyzqlqrnevuiiienxzmwtdsyhgstwmvznrvhyihhcxjijhiojphvjw

 

srpejwnhrhirqbcdwnzqmwjpoibnbjdeshloewcfdhvzjgtdwsvntydyweyll

 

gjrrohfuyplppzrssvniejxhzjtrwyvvdecpttrieevhzlxsvunstovzwjfsa

 

svlsgzjcvwmseioidhsywsddisrjadhkcideivjzwwsfqjcwphvwtdtkatkjg

 

zjwfpjbjbofwgochaegfhmyodpjbkwtfukcixokkrseoaegbcdanjitckxaco

 

xvvdajdqgfxetrrskdewlwgketronoesoddshfxezqiitpeulshfdeiftiepr

 

pvkcfpbroqwechroqcwbadhfbuwlcwmokshzojkfnkzqlojhanbjfzjhvuxdr

 

neklrskdezqiswwtzjfpcamfufqvolrwjgkreewzfvesrvftzbauhasckpdhs

 

hzjskuzqkkrydawecjlvyqfjdlfysuwcfxwgvhajwbsvgbvwbsvjaegtqkkbv

 

ufhkdezufbzwnwrthswlcdhouamplshvdrrqyvvnejkjhiwiehiwiwnzdskfi

 

eershyatvfmbzyacdxdvytjrkqfwcylsunkmvqxtfktsdqzektaxxhwkokefz

 

cxukvustefzffzcuwfpjbjbofwgochwyrjjvnsrbxhywtkkjavjsxdrsrjdkk

 

jkfieevlodaaihyvvoadhmojylvdwzpjemhwkfnkvgnbrlrfijgjeoedqseri

 

irsavjtjkjhfhdwlkotkmrvritdajztavjswrthswlckfgxnonqtjvntyhqoj

 

pfvzistwdvvnhywsewgstkmvdsmdkrvvnazhaiwthyamvqxurienrrsewrvsm

 

mjecroqmuefwhwseptfpjbrjdkkjafnekkjkfieevlodadvyjzflskkjafnez

 

wngwqlcrkggaczinqzpivvyvrprvtzwiaaulktvneewfdgnorfmtikmrftotd

 

jlvyzzgejddwerocojmswlcrwprokvwgochtyhwsjjogrnbkenxutigenxlyo

 

chuegjfkdejdrstwtvjtfpphvrgjzkujsmmjecroiwwbeihsqvoaihtbcutyh

 

xhrntzqldfenkwmswkrdhwgknibhwocoogrnbkotfnjmkwcklhocziwijfvjc

 

vvfbuprrlswecmvwmcuotrnjomarpvnaghevafaghekkjdzcgplshyamzgizv

 

zrzoqgjdetrshzjuvgdclnedraskdakiwcdwmvqxhiwielsujasjltbrjdprz

 

fvhojwbvvnervlsearroqmjlernnbxbeddqsghaphwguknkwjbupotdwsrxol

 

wyvzokzqicwyodsjhzpimhssjoiedboiiugptfryeyrusjphrwismalfsrsep

 

ielywrpimhxzzgekkjkfieevkcfpbroqqfwcylsutkuivjwepeyufbnditkbo

 

jwtkhsrvzbpztavjoeodkzhlyhqdkknruwcnphvjfdsatnhjbkdefsucipuel

 

ywvoawitfuadkrrocaaegksdwlvftotdejrkqfqrjhdcldamhlfvwttrfqyas

 

kkfhljdvuxhrjdkkjkfieevlodalznjoepoeltqrxrzqnweetrodcilhzondg

 

abvulsikozqkfrjcvvfwuioidhssqtnkfhjprznjgdaijzmseoodhysrisfuh

 

zlxstktcjahvdiqfwcyhxbfpbrvjrfjaivzafneosjfzanthgikkncbgstwuj

 

hyvvuhrsuseposhrsewszvfwuxewrwskdexdrszodziksiankdsrkdakvhzvw

 

rkrjjvnyfqjplptyhtdgkrkxswkeejdktfndvgyctkatkjgjdoloibkxeulkt

 

vneewtdgkrkxswkeejitfrhlkkjufopvoyvrpmfufqvesgujotdiejnggwrkl

 

hicwrcbaocqasojwephvpnruhevdxhndeihqokalpztavjswrthswlckfgdwd

 

vgwodwtzfxhiedvvnfrjffujlripchkwvhdjztavjsedywfjacwjodofirroc

 

hcrwjufnivvxhrntzqlokqaegnhjjakltbrhlvdlivberwzfvotvdrgzjtyhk

 

wiotulawjeoedsrrjokkjfwevvlshyasvftbuzimlxwfjnfwycdankltbrpok

 

dqtlpsroysrisjswsrzatutgjboluiwwbeihshcaaxxjrzrijltbjwtwlwgkc

 

lrqhszpsvdxmwkrnhxhvnnjwthvjdkryvzjkkkfhkdijlxotkmgojhvhyulkt

 

vneewhicpuihgikdoehxhcuajdswkwlzdskywtjwwitgmvwmsdkskzjfvphvv

 

nazhailywvosrliafnathusfllvdwsnwrddsrrlpirfqywbchfbuphvujgekp

 

cdhsndeihyvrpijdxqcaaidxwebofwgochwydywjavzgjbkpodhnbkahidswj

 

wgzjfbkecgdxgzknwrwtfktsdqzrhemhqcwenkhwsjptydygknucbtikotrqi

 

wecsghhwwecroqmrioejyvvsodhshykuxknhjylvdwhywtkknggwsjltbtwri

 

ljgrlokhshzwlnknqyesfqqmekwshnbxqnkdudvzhfsjtlhlpwmwjyoluxszo

 

aelrdfntrqygkapkrboizskkngdwhuljafdadpfrbdaelfavibvuttkdezufb

 

zwnwdxkfieevhcdiikwjswqlcbfuiaejznhyphvitfdarzwfzpwnuffbrzatr

 

fqysodhsgwkokefzcdajiqclnijkjrzjrvfjbkueruxoeznfzfrruszwxhyam

 

fvydflucdwggkrkdrceciidswrjwfpjbjdejdnrzpsroxcfjefiyvvbamrzfz

 

pejstfkoffurijhidztavjbvffijatyhdoiaacotkvztfsqopshzojkvwrzql

 

oyaauvhoibmfkfadwdbkfbzwljrgsceemhxhywttrrpzjakltbfbdvyjzflmv

 

qyqfqrjhxoezeclystkmghywkeoevqwbanvaymvwrjintrqwfpjbjsoioiwef

 

oigfbkdewlwgksodhsgnkrcghigdecgnbkdedlircaervyoiatyhbopboizff

 

uboiwmsiagzrswkoaxujokkpgrwhljikbycrptidhhgqbclhcgenzrshfsodh

 

sgwkokefzcwnudqgfboiijarhedlircaervysijtvdrgkksyrbhyaiivyfvjg

 

Kkxoxwievywepeiqfhzknrotdgknvqygjdetrsqcqdvg


破解过程:

1.先确定是单表还是多表加密,通过统计字母频率

把密文复制到Ciphertext处,点击左侧Freq,就有统计字母频率的功能。

统计结果:

a  120  0.034

b   91  0.026

c  105  0.030

d  178  0.051

e  178  0.051

f  164  0.047

g   99  0.028

h  180  0.051

i  148  0.042

j  205  0.058

k  201  0.057

l  111  0.032

m   55  0.016

n  113  0.032

o  146  0.041

p   85  0.024

q   82  0.023

r  193  0.055

s  168  0.048

t  139  0.039

u   87  0.025

v  177  0.050

w  210  0.060

x   63  0.018

y   97  0.028

z  126  0.036

可以选择用图表的形式显示出来:

可以看到字母频率分布的较平均,没有某个字符概率很高或者概率很低,所以猜测这是一个多表加密的密文。(因为单表加密通常都会显示出语言的特征)

现在已经知道是多表加密了,那用的是哪种多表加密算法呢?

实际的办法就只能一个个尝试。

首先假设这是一个Vigenere密码算法加密的密文:

先要确定密钥的长度

用CAP的Kasiski,得知

String    Distance

yvv         273

yvv         707

yvv         868

yvv        1953

yvv        2765

yvv        3101

Yvv出现的距离:434 595 1680 2492 2828

最大公约数是7

猜测密钥的长度是7

再用CAP的Low Freq

输入密钥的长度7,给出的可能密钥是forward。

用CAP的Vigenere Cipher,输入keyword:forward,给出的原文是

there are very few people as entitledtoanalysethesimilaritiesanddif
ferencesbetweenmensandwomensfootballascarolinamoracefollowing
ayearplayingcareerduringwhichshebecamewidelyrecognisedasthegr
eatestitalianwomaninhistoryinshebeganacoachingcareerthatinclu
dedashortbutpioneeringstintatthehelmofamensclubseriecsviterbe
seinsincethenmoracehasmadeanameforherselfasoneofthetopcoaches
inwomensfootballandatvcommentatorforbothmensandwomensfootball
shehasalsobecomethefirstitalianwomantobeinductedintohercountr
ysfootballinghalloffameandallthatwhileworkingaslawyerinherspa
retimetheindefatigablemoraceslatestventureisasafifadevelopmen
tinstructorhavingjustconductedacourselastweekbetweenandoctobe
rattheiranianfootballacademyintehranthereshetrainediranianwom
enonthetechnicalaspectsofcoachingwomensfootballnotjustfootbal
lbutspecificallywomensfootballwhoeversaysthatthemensgameandth
ewomensgamearethesamehasclearlyneverworkedinaprofessionalenvi
ronmentshetoldfifacomasmuchaswomensfootballhasgrownoverthelas
tfewdecadesithasntbecomeanymoresimilartothemensgamewomenareph
ysicallydifferenttomenandthemorethewomensgamedevelopsthemorei
tisfullofspecificitiesthatrequireadifferentapproachfromacoach
justlikesayinvolleyballorbasketballtheresnopointingroupingita
llunderthesamecategorytheobviousphysicaldifferencesareonlythe
startingpointtheformerstrikeralsopointstokeytacticaldifferenc
esandtrainingmethodstakeaverysimpleexamplethepiggyinthemiddle
drillsshecontinuedyouremovethatfromamenstrainingsessionandyou
relostwhereasgenerallyspeakingfemaleplayersdonttendtocareabou
tthiskindofcompetitivenessinawarmupmoracehopesthatdevelopment
initiativeslikethewomensfootballcoachingcourseintehranwhichwa
sattendedbywomenonlywillhelptonarrowthegapbetweentheopportuni
tiesaffordedtomaleandfemalecoachesofcourseyouhavegreatcoaches
thatunderstandthewomensgamelikeantoniocabriniinitalyorphilipp
ebergerooinfrancesaidmoracebutwhatstrikesmeiswhensometeamsorc
lubschooseheadcoachesnotbasedonarsumorexperiencebutonlybecaus
etheyhappentobemenasisaidbeforethegameisdifferentandthatsclea
rtoeveryonebuttheopportunitiesaffordedtocoachesshouldntbediff
erentopportunitiesforallthegospelthatmoraceispreachingisparti
cularlyvaluableinthemiddleeastwherelatelywomensfootballhasmad
edramaticstridesiranforexamplefieldswomensnationalteamsfromal
lcategoriesstartingatuanditsnationalleaguefeaturesteamsinthef
irstdivisionandanotherfiveintheseconddivisionnottomentionatot
alfutsalteamsspreadacrossfourdifferentleaguedivisionsatfirstg
lanceitseasyforwesternstotendtothinkthatthisisacompletelydiff
erentculturebuthonestlyasanitalianwhatstruckmethemostwerethes
imilaritiessaidmoracepeoplearewarmandapproachableandtheresnop
lacewherethatisasclearasinfootballwhatisevidenttomeintehranis
agiganticpassionforfootballalevelofinterestthatstrulyoutstand
ingspecificallyamongthewomenthoughitsclearthatthispassioncarr
iesapotentialwhichisonlynowbeinguntappedhopefullythiscourseis
animportantsteptowardsthismahdiemohammadkhaniamemberoftheiran
ianfaswomenscommitteefullyagreeswiththeformeritalyandcanadaco
achwomensfootballhasflourishedinrecentyearsandnowadaysitsthem
ostpopularsportamongiranianwomenshesaiditsalsooneofthefavouri
tesportsformuslimwomenbecausetheyareallowedtoplaywhilewearing
aheadscarfmohammadkhanialsobelievesthatcombinationofdevelopme
ntcoursesandelitecompetitionslikenextyearsfifauwomensworldinj
ordanthefirstwomensworldcupheldinthemiddleeastarethewayforwar
dfortheregionitsagreatopportunitytoattractpublicopiniontowome
nsfootballandalsoforfemalemiddleeasternteamstoshowtheirstreng
thsagainstinternationalopponentssheconcluded

发现译文是有意义的,就把这个密文破解了。

如果发现译文是无意义的,就需要假设别的加密算法,根据假设的算法来使用相应的解密方法。

使用CPA4破解经典密码算法的更多相关文章

  1. Android逆向之旅---Android中锁屏密码算法解析以及破解方案

    一.前言 最近玩王者荣耀,下载了一个辅助样本,结果被锁机了,当然破解它很简单,这个后面会详细分析这个样本,但是因为这个样本引发出的欲望就是解析Android中锁屏密码算法,然后用一种高效的方式制作锁机 ...

  2. 破解magento加密的密码算法

    magento遇到丢掉密码的情况,其实很常见……比如我这记性,还好我比较暴力:-P      先看一段代码:           /**  * Hash a string  *  * @param s ...

  3. 【十大经典数据挖掘算法】PageRank

    [十大经典数据挖掘算法]系列 C4.5 K-Means SVM Apriori EM PageRank AdaBoost kNN Naïve Bayes CART 我特地把PageRank作为[十大经 ...

  4. 5分钟破解wpa2密码(转)

    首先大家要明白一种数学运算,它叫做哈希算法(hash),这是一种不可逆运算,你不能通过运算结果来求解出原来的未知数是多少,有时我们还需要不同的未知数通过该算法计算后得到的结果不能相同,即你不太可能找到 ...

  5. 密码算法详解——DES

    0 DES简介 在20世纪60年代后期,IBM公司成立了一个由Horst Feistel负责的计算机密码学研究项目.1971年设计出密码算法LUCIFER后,该项目宣告结束.LUCIFER被卖给了伦敦 ...

  6. Mac系统安装Aircrack-ng破解wifi密码(2)

    我们上一篇文章说过如何通过Aircrack-ng, 破解使用WPA/PSK加密方式的路由密码, 这一篇介绍的是使用Aircrack-ng破解使用WEP加密方式的路由密码: WEP和WPA/PSK的区别 ...

  7. Kali Linux使用Aircrack破解wifi密码(wpa/wpa2)

    Kali Linux能做很多事,但是它主要以渗透测试及'破解wifi密码'闻名. 如果你使用Macbook 请看 使用macbook破解WPA/WPA2 wifi密码 要求: 安装有Kali Linu ...

  8. 路由器安全——破解wifi密码,同时中间人攻击

    聊聊安全那些事儿 篇一:Wi-Fi安全浅析 2016-04-25 13:18:16 141点赞 712收藏 63评论 前言 近期,Wi-Fi相关的安全话题充斥着电视新闻的大屏幕,先是曝出了路由器劫持的 ...

  9. liboqs-量子安全密码算法开源C库

    liboqs是一个用于量子安全密码算法的开源C库. 一,概述 liboqs提供: 量子安全 密钥封装机制(KEM)和数字签名算法的开源实现的集合: 这些算法的通用API: 测试工具和基准测试例程. l ...

随机推荐

  1. HDU4417 - Super Mario(主席树)

    题目大意 给定一个数列,每次要求你查询区间[L,R]内不超过K的数的数量 题解 和静态的区间第K大差不多,这题是<=K,先建立好n颗主席树,然后用第R颗主席树区间[1,K]内数的数量减去第L-1 ...

  2. Java 网络编程最佳实践(转载)

    http://yihongwei.com/2015/09/remoting-practice/ Java 网络编程最佳实践 Sep 10, 2015 | [Java, Network] 1. 通信层 ...

  3. asp.net Mvc+bootstarp+esayUI+EF 框架(一)

       "框架" 这两个字从通俗的意义来讲就是提高复用性,解耦类之间的关系和方便开发人员开发.   使用的技术也是大家基本现在都用过的,而这个系类我所要讲的内容是什么呢? 框架的基本 ...

  4. ios 工程配置统一增加类的前缀(知识点也只能算知识点)

    在前边的代码规范中提及:团队开发或者个人开发为了打包或者自己工程中避免创建新的类核第三方系统的重复增加类的统一前缀!!又很多人问我这种开发小技巧.下面我就普及一下: 1.首先选中你的工程配置 2.然后 ...

  5. [C#]工具类—FTP上传下载

    public class FtpHelper { /// <summary> /// ftp方式上传 /// </summary> public static int Uplo ...

  6. HDInsight-Hadoop实战(一)站点日志分析

    HDInsight-Hadoop实战(一)站点日志分析 简单介绍 在此演示样例中.你将使用分析站点日志文件的 HDInsight 查询来深入了解客户使用站点的方式.借助此分析.你可查看外部站点一天内对 ...

  7. linux 系统磁盘分区之fdisk

    对于学习磁盘分区,通常学习的都是fdisk命令 当然,对于小于2TB的磁盘,我们基本上是使用fdisk命令进行分区 下面就简单介绍一下fdisk操作磁盘的基本命令和场景模拟 常用命令介绍   fdis ...

  8. [欧拉] poj 2230 Watchcow

    主题链接: http://poj.org/problem? id=2230 Watchcow Time Limit: 3000MS   Memory Limit: 65536K Total Submi ...

  9. 用Python和FFmpeg查找大码率的视频文件

    用Python和FFmpeg查找大码率的视频文件 本文使用Python2.7, 这个工作分两步 遍历目录下的视频文件 用ffprobe获取是视频文件的码率信息 用ffprobe 获取json格式的视频 ...

  10. SQLite的SQL语法

    SQLite库能够解析大部分标准SQL语言.但它也省去了一些特性而且增加了一些自己的新特性.这篇文档就是试图描写叙述那些SQLite支持/不支持的SQL语法的.查看keyword列表. 例如以下语法表 ...