I've been thinking about this off and on, and never really seen any answer to it on forums or tech websites and such (I don't read any more specialized publications on the matter, as the subject matter is generally far above my head), but when brute-force breaking a crypto, how do you actually know you've broken it...?
Presumably, you'd do it by recognizing the content, since I doubt cryptos come with Pachinko machine-style bells and flashing lights when you succeed... So, if you scramble your content according to some sufficiently complicated algorithm (like, Rot13, but better) before running it through encryption, how would an intruder know they've succeeded in breaking the crypto? I guess there isn't any sure way of knowing.
You'd have to run some kind of statistical analysis looking for repeating patterns that would correspond to say, known written languages or machine language opcodes that could help you unscramble the data for every single set of keys attempted, if you don't suddenly end up with plaintext data.
Seems very complicated, and of course time-consuming...
Presumably, you'd do it by recognizing the content, since I doubt cryptos come with Pachinko machine-style bells and flashing lights when you succeed... So, if you scramble your content according to some sufficiently complicated algorithm (like, Rot13, but better) before running it through encryption, how would an intruder know they've succeeded in breaking the crypto? I guess there isn't any sure way of knowing.
You'd have to run some kind of statistical analysis looking for repeating patterns that would correspond to say, known written languages or machine language opcodes that could help you unscramble the data for every single set of keys attempted, if you don't suddenly end up with plaintext data.
Seems very complicated, and of course time-consuming...