Information pending...

Wrong information. Give me a second...
High Quality Resources for Collectible Card Games and Home of the CCGHQ Team
https://www.slightlymagic.net/forum/
https://www.slightlymagic.net/forum/viewtopic.php?f=117&t=14839
Rick wrote this on 16th July:Xander9009 wrote:Is anyone working on this? Does anyone know if Rick is still planning to look into it?
It seems that the "probabilities" have been against us. Of course I don't blame him, if he's not interested into it then it's natural that he doesn't look into it.Rick wrote:I will probably take a look at 2015 once I have a copy, which will probably be sometime next month, as I have no plans to get it immediately.
Hopefully you have more luck than I did. I tried something similar on the 3dm forums but never got a response.thefiremind wrote:Just to let everyone know, I tried to ask for help on the Magic 2015 topic in the cs.rin.ru forums as a last resort. Maybe someone will share some information, maybe I'll be ignored, or maybe they'll virtually throw stones at me... but I had to try.
I saw your post in that forum and I wish someone could give you some infos. I think that CODEX group know how to decrypt Zed Data file cause they release a version of update1 of the game of about 18 MB instead of about 800 MB; normally it's possible if you correct only changed parts in files but Zed Data file in encrypted form is totally different!thefiremind wrote:Just to let everyone know, I tried to ask for help on the Magic 2015 topic in the cs.rin.ru forums as a last resort. Maybe someone will share some information, maybe I'll be ignored, or maybe they'll virtually throw stones at me... but I had to try.
3C 46 69 6C 65 73 3E 0D 0A 09 3C 46 69 6C 65 20 4E 61 6D 65 3D 22
<Files> <File Name="
This is the first brute-force approach that I've seen which might have any chance of success. It's still unlikely, because the file is so large that it might very well require simply too much computational power to brute-force crack it. However, the new expansion is also encrypted, right? It should be much smaller but it should use the same encryption... Worth a shot.NeoAnderson wrote:I was wondering if is possible to use a brute force attack to decrypt the DATA_000.ZED file.
I see that both MOVIES_000.ZED and AUDIO_000.ZED start with the same Hex values :Corresponding to :
- Code: Select all
3C 46 69 6C 65 73 3E 0D 0A 09 3C 46 69 6C 65 20 4E 61 6D 65 3D 22
Now if we could agree that also DATA_000.ZED should start with the same values we could :
- Code: Select all
<Files> <File Name="
use some kind of decryption algorythms based on "Known-plaintext" attack, this means that they try to decrypt an encrypted text starting from a know plain text.
There is also some good tools that could be use for this purpose as like CryptTool (Cryptool download site)
Someone think that we could have some results with this approach?
Cryptool should allow to us to use a short parts of the file to apply the brute force. We could copy just the first 6000 characters to apply the decryption..but i honestly don't know if it could work, i never use decrytpion algorythms i think the starting point could be AES 128 bit...Xander9009 wrote:This is the first brute-force approach that I've seen which might have any chance of success. It's still unlikely, because the file is so large that it might very well require simply too much computational power to brute-force crack it. However, the new expansion is also encrypted, right? It should be much smaller but it should use the same encryption... Worth a shot.
I don't know enough about encryption to know we could just cut it down. I over-complicate everything I do, so if I were to make an encryption algorithm, it wouldn't be able to be decrypted unless the entire file was present and uncorrupted.NeoAnderson wrote:Cryptool should allow to us to use a short parts of the file to apply the brute force. We could copy just the first 6000 characters to apply the decryption..but i honestly don't know if it could work, i never use decryption algorithms i think the starting point could be AES 128 bit...Xander9009 wrote:This is the first brute-force approach that I've seen which might have any chance of success. It's still unlikely, because the file is so large that it might very well require simply too much computational power to brute-force crack it. However, the new expansion is also encrypted, right? It should be much smaller but it should use the same encryption... Worth a shot.