Timeline for Are questions about identifying encryption algorithms allowed?
Current License: CC BY-SA 3.0
7 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jun 17, 2020 at 8:16 | history | edited | CommunityBot | Commonmark migration | |
| Aug 13, 2014 at 18:47 | vote | accept | Xcelled | ||
| Aug 13, 2014 at 15:52 | comment | added | Gilles 'SO- stop being evil' | Reverse Engineering may be of some help. | |
| Aug 11, 2014 at 6:29 | answer | added | otus | timeline score: 4 | |
| Aug 8, 2014 at 20:39 | comment | added | Xcelled | @CodesInChaos unfortunately, it seems like all the googleable magic numbers are in the initialization vector, not the algorithm itself... | |
| Aug 8, 2014 at 10:41 | comment | added | CodesInChaos | Google for the magic numbers in the code. Most crypto algos have those. | |
| Aug 8, 2014 at 8:59 | history | asked | Xcelled | CC BY-SA 3.0 |