Wrong, unfortunately.  Brute force attack can still decode your message.
You're using simple transposition, which went the way of the dodo back in
WWII.

Also, if you're doing the decryption and encryption on your CF server,
what's to stop someone from taking the source code and decrypting at will?

-----Original Message-----
From: Pooh Bear [mailto:[EMAIL PROTECTED]]
Sent: July 24, 2001 2:31 PM
To: CF-Talk
Subject: Encryption Question PART 2


hey, i'm the Original Inquirer.  heh, kinda like that title.  ermm anyways,
like i said, the code turns 4665775886868576 into
"hkjsdhk987697834^*&^@@@Kj=-018^%13534kljdsa986(*@*&(@# dsjfkhk"  junk.
someone said that someone could get the pattern, but i think it is
impossible, since part of the encryption uses ASC or Char to change
characters (only certain letters according to what the "ith" number is), and
they will never know at which point i used that transformation, or how many
times. MUWHAHAHA!  or what else I did (i also used mathematical
calculations, string appends, and other string functions).  I mean every
outcome is sooo different finding a pattern is impossible.  And every
outcome comes doesn't have the same amount of character lengths.  like, the
only possible way to figure it out is to look at the CF code itself, and
then to work it backwards (which took me a while to figure out too bahehehe)

Am i right/wrong in my assumption?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Structure your ColdFusion code with Fusebox. Get the official book at 
http://www.fusionauthority.com/bkinfo.cfm
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Archives: http://www.mail-archive.com/cf-talk@houseoffusion.com/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to