Chacha20 Encryption - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Chacha20 Encryption (/thread-10145.html) |
Chacha20 Encryption - stamun8 - 06-03-2021 Is there any way to bruteforce both chacha20 key and nonce(iV)? Is there any explanation of the chacha20 hash format? Code: static const char *ST_PASS = "hashcat_hashcat_hashcat_hashcat_"; RE: Chacha20 Encryption - atom - 06-03-2021 The 0200000000000001 is the IV RE: Chacha20 Encryption - stamun8 - 06-04-2021 The 5152535455565758 should be the plaintext. The 6b05fe554b0bc3b3 should be the ciphertext. Any ideas about *0400000000000003*16? RE: Chacha20 Encryption - atom - 06-04-2021 sure, is the counter and offset. see tools/test_modules/m15400.pm for high level view |