From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 3243fe69b75087a9a8b603bacb61709ab1f343284e6271d8572524364dd2c447
Message ID: <9404051932.AA10374@ah.com>
Reply To: <Pine.3.89.9404051333.D1183-0100000@selway.umt.edu>
UTC Datetime: 1994-04-05 19:45:27 UTC
Raw Date: Tue, 5 Apr 94 12:45:27 PDT
From: hughes@ah.com (Eric Hughes)
Date: Tue, 5 Apr 94 12:45:27 PDT
To: cypherpunks@toad.com
Subject: CRYPT
In-Reply-To: <Pine.3.89.9404051333.D1183-0100000@selway.umt.edu>
Message-ID: <9404051932.AA10374@ah.com>
MIME-Version: 1.0
Content-Type: text/plain
>I am trying to crack a textfile which has been encrypted with a program
>(for the IBM) called CRYPT.
The first thing you want to know is what the underlying algorithm used
was. The documentation might tell you. The source code would tell
you. Disassembled object code would also tell you.
Do you have any of these?
Eric
Return to April 1994
Return to “Ryan Snyder–Consultant <cs000rrs@selway.umt.edu>”