473,404 Members | 2,213 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,404 software developers and data experts.

How safe are encrypted zip files? What if we have the unzipped form of a zipped file?

(((
I know that if we use a complicated password for zip files that has more than 8 characters, it's quite safe and can't be cracked easily...
For example, for an 8-digits complicated password (containing ABC,abc,123,!@#), it takes 83.5 days for a supercomputer to test all combinations, and 22 years for a 9-digit!!!!)
)))

But in an example, we have an encrypted zip file that contains multiple files, and we have the extracted form of one of those files

In this case and with having the original and zipped-encrypted file, can we write a program that cracks the password easily...? Not by taking months or even years to crack?

It it's possible, there will be problems; for example, a zip file may contain ""thumbs.db"" or ""desktop.ini"" files, that use almost the same pattern everywhere... and more common: every file format has its own hex pattern too!!! (For example, EF BB BF for UTF-8 text files)... and situations that we know the contents of a part of a text file... etc.
Jun 23 '14 #1

✓ answered by Rabbit

1) AES is a sufficiently strong algorithm.

2) I'm not sure what your point is. That example is answered by #4.

3,4) AES is just an algorithm. It's up to the programmers of whatever program you're using to implement it correctly. I can't tell you if the programmers implemented the algorithm correctly because only they know the ins and outs of their source code.

3 5537
Rabbit
12,516 Expert Mod 8TB
1) It depends on what algorithm the encryption uses.

2) If an attacker has the original files, there's no need to crack the password. You already have the data. Plus you shouldn't reuse passwords with a different file so even if they crack one, they can't open the others.

3) Even if they had both, a properly implemented algorithm will not allow them to figure out the key.

4) Even if you have a lot of files with the same sequence of bytes, a correctly implemented algorithm will encode those same sequences differently.
Jun 23 '14 #2
Thanks a lot!!!

1) ZIP files use symmetric-key algorithm, AES encryption.

2) Sometimes we have a part of a single file. For Example some HTML files start with:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

or PNG files start with hex code:
89 50 4E 47 0D 0A 1A 0A


3, 4) Is AES encryption a properly implemented algorithm????
Jun 24 '14 #3
Rabbit
12,516 Expert Mod 8TB
1) AES is a sufficiently strong algorithm.

2) I'm not sure what your point is. That example is answered by #4.

3,4) AES is just an algorithm. It's up to the programmers of whatever program you're using to implement it correctly. I can't tell you if the programmers implemented the algorithm correctly because only they know the ins and outs of their source code.
Jun 24 '14 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: Noud Aldenhoven | last post by:
Hello everyone, I was wondering how to remove comments away form a file. So that's why I made this script. =============================== #!/usr/bin/env python import sys import string
3
by: Philip Herlihy | last post by:
I'm using a number of hyperlinks on an Intranet I'm developing which refer to documents on a network server. The URLs I'm using have the form: file://<server>/<path>/<file>.pdf <server> is an...
1
by: Peted | last post by:
Hi i am relatively new to the c++ visual studio.net 2003/2005 evniroment. I am wondering why all the c++ code for winforms apps are being placed in a .h file. Isnt this against c++ coding...
3
chunk1978
by: chunk1978 | last post by:
hi there... i have a form where a user may optionally upload a maximum of 2 files along with other textual data (there are 2 file fields built in the form). i'm having trouble writing a php script...
4
by: Cesa | last post by:
Hi, I have a Form in a seperate thread not unlike this example. Say I want to send a string to the form from another thread, what would be the best way? I'm not asking for an entire solution,...
0
by: nettynet | last post by:
I'm really new in java. I'm trying to read 8000 URL files and write to a file. It's a kind of combining all files together...not overwritten. This is the URL of my all files...
2
by: ypper2001 | last post by:
Here is my "problem": I have a form that is based on a lot of different querys,the result of the querys shown in the form are based one the input given on the form, this form is in two versions and...
1
by: 7seven7 | last post by:
Once i zipped my file a simple .xls spread sheet i write it to a database ... evoking the toArray() method of the memory stream, however now trying to recover this zipped file it doesn't display the...
4
by: raamay | last post by:
i have a form which allows files to be uploaded. i have no problem with the upload script as it works perfectly within my local web server. As i host it in my hosting server the upload do not work. i...
3
by: Susan StLouis | last post by:
I'm writing a program that can be used to compare files. The program features a select that contains a list of files. After selecting several of the files. a "Biggest" button can be pushed to find...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.