From: “Ching Yen Choon” <ycching@unitele.com.my>
To: <cypherpunks@toad.com>
Message Hash: 234ef8297aba38eec3a8343aee94d4ccd8367216079573861aff05f823b14532
Message ID: <199801100849.IAA17818@acs.unitele.com.my>
Reply To: N/A
UTC Datetime: 1998-01-10 01:08:21 UTC
Raw Date: Sat, 10 Jan 1998 09:08:21 +0800
From: "Ching Yen Choon" <ycching@unitele.com.my>
Date: Sat, 10 Jan 1998 09:08:21 +0800
To: <cypherpunks@toad.com>
Subject: Cracking a program
Message-ID: <199801100849.IAA17818@acs.unitele.com.my>
MIME-Version: 1.0
Content-Type: text/plain
Let's say I have this encryption program and I don't know what's the
algorithm used in it. Is there a technique I can analyse and break it? Are
there any books or sites which teaches us how to do it?
Any help is much appreciated
Thank you.
YeN ChOoN
Return to January 1998
Return to ““Ching Yen Choon” <ycching@unitele.com.my>”
1998-01-10 (Sat, 10 Jan 1998 09:08:21 +0800) - Cracking a program - “Ching Yen Choon” <ycching@unitele.com.my>