Recover aes key











up vote
1
down vote

favorite












I had encrypted 2 mysql database with aes_encrypt ECB 128 bit, now I forgot my encryption key, but I have plain text(I have one database without encryption and same with encryption) how to find encryption key so I can decrypt my other database.



I heard about known plain text attack, how to do this, is there any tool in Kali Linux or some python script on GitHub?










share|improve this question







New contributor




hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.
























    up vote
    1
    down vote

    favorite












    I had encrypted 2 mysql database with aes_encrypt ECB 128 bit, now I forgot my encryption key, but I have plain text(I have one database without encryption and same with encryption) how to find encryption key so I can decrypt my other database.



    I heard about known plain text attack, how to do this, is there any tool in Kali Linux or some python script on GitHub?










    share|improve this question







    New contributor




    hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.






















      up vote
      1
      down vote

      favorite









      up vote
      1
      down vote

      favorite











      I had encrypted 2 mysql database with aes_encrypt ECB 128 bit, now I forgot my encryption key, but I have plain text(I have one database without encryption and same with encryption) how to find encryption key so I can decrypt my other database.



      I heard about known plain text attack, how to do this, is there any tool in Kali Linux or some python script on GitHub?










      share|improve this question







      New contributor




      hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      I had encrypted 2 mysql database with aes_encrypt ECB 128 bit, now I forgot my encryption key, but I have plain text(I have one database without encryption and same with encryption) how to find encryption key so I can decrypt my other database.



      I heard about known plain text attack, how to do this, is there any tool in Kali Linux or some python script on GitHub?







      encryption aes






      share|improve this question







      New contributor




      hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 4 hours ago









      hui shan ki

      61




      61




      New contributor




      hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      hui shan ki is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          2 Answers
          2






          active

          oldest

          votes

















          up vote
          3
          down vote













          Realistically, no you cannot. AES is very resistant to known plaint text attacks like most block ciphers.
          It's lucky you didn't lose any information and have the original database backup because your only real option would be to try brute force the encryption, which is likely to take longer than the length of the universe (unless you can greatly narrow down possible keys by almost remembering your password?)






          share|improve this answer








          New contributor




          Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
          Check out our Code of Conduct.


















          • Then, why people say "ECB is insecure" ?
            – hui shan ki
            4 hours ago








          • 1




            Have a read of: crypto.stackexchange.com/questions/20941/… A crypto protocol being 'insecure' doesn't always mean it can be easily cracked, just that it is not as secure as other alternatives.
            – Aide
            4 hours ago


















          up vote
          2
          down vote













          What you are asking for is a known-plain-text attack (KPA). The weakness you describe in ECB is where two encrypted blocks with the same plaintext are encrypted with the same ciphertext.



          This just means you know that two encrypted blocks in the ciphertext look the same, it doesn't mean that you can recover the plain text easily. The answer is: no you will not be able to recover the key.






          share|improve this answer





















            Your Answer








            StackExchange.ready(function() {
            var channelOptions = {
            tags: "".split(" "),
            id: "162"
            };
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function() {
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled) {
            StackExchange.using("snippets", function() {
            createEditor();
            });
            }
            else {
            createEditor();
            }
            });

            function createEditor() {
            StackExchange.prepareEditor({
            heartbeatType: 'answer',
            convertImagesToLinks: false,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: null,
            bindNavPrevention: true,
            postfix: "",
            imageUploader: {
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            },
            noCode: true, onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            });


            }
            });






            hui shan ki is a new contributor. Be nice, and check out our Code of Conduct.










            draft saved

            draft discarded


















            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f199879%2frecover-aes-key%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes








            up vote
            3
            down vote













            Realistically, no you cannot. AES is very resistant to known plaint text attacks like most block ciphers.
            It's lucky you didn't lose any information and have the original database backup because your only real option would be to try brute force the encryption, which is likely to take longer than the length of the universe (unless you can greatly narrow down possible keys by almost remembering your password?)






            share|improve this answer








            New contributor




            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.


















            • Then, why people say "ECB is insecure" ?
              – hui shan ki
              4 hours ago








            • 1




              Have a read of: crypto.stackexchange.com/questions/20941/… A crypto protocol being 'insecure' doesn't always mean it can be easily cracked, just that it is not as secure as other alternatives.
              – Aide
              4 hours ago















            up vote
            3
            down vote













            Realistically, no you cannot. AES is very resistant to known plaint text attacks like most block ciphers.
            It's lucky you didn't lose any information and have the original database backup because your only real option would be to try brute force the encryption, which is likely to take longer than the length of the universe (unless you can greatly narrow down possible keys by almost remembering your password?)






            share|improve this answer








            New contributor




            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.


















            • Then, why people say "ECB is insecure" ?
              – hui shan ki
              4 hours ago








            • 1




              Have a read of: crypto.stackexchange.com/questions/20941/… A crypto protocol being 'insecure' doesn't always mean it can be easily cracked, just that it is not as secure as other alternatives.
              – Aide
              4 hours ago













            up vote
            3
            down vote










            up vote
            3
            down vote









            Realistically, no you cannot. AES is very resistant to known plaint text attacks like most block ciphers.
            It's lucky you didn't lose any information and have the original database backup because your only real option would be to try brute force the encryption, which is likely to take longer than the length of the universe (unless you can greatly narrow down possible keys by almost remembering your password?)






            share|improve this answer








            New contributor




            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.









            Realistically, no you cannot. AES is very resistant to known plaint text attacks like most block ciphers.
            It's lucky you didn't lose any information and have the original database backup because your only real option would be to try brute force the encryption, which is likely to take longer than the length of the universe (unless you can greatly narrow down possible keys by almost remembering your password?)







            share|improve this answer








            New contributor




            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.









            share|improve this answer



            share|improve this answer






            New contributor




            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.









            answered 4 hours ago









            Aide

            311




            311




            New contributor




            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.





            New contributor





            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.






            Aide is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
            Check out our Code of Conduct.












            • Then, why people say "ECB is insecure" ?
              – hui shan ki
              4 hours ago








            • 1




              Have a read of: crypto.stackexchange.com/questions/20941/… A crypto protocol being 'insecure' doesn't always mean it can be easily cracked, just that it is not as secure as other alternatives.
              – Aide
              4 hours ago


















            • Then, why people say "ECB is insecure" ?
              – hui shan ki
              4 hours ago








            • 1




              Have a read of: crypto.stackexchange.com/questions/20941/… A crypto protocol being 'insecure' doesn't always mean it can be easily cracked, just that it is not as secure as other alternatives.
              – Aide
              4 hours ago
















            Then, why people say "ECB is insecure" ?
            – hui shan ki
            4 hours ago






            Then, why people say "ECB is insecure" ?
            – hui shan ki
            4 hours ago






            1




            1




            Have a read of: crypto.stackexchange.com/questions/20941/… A crypto protocol being 'insecure' doesn't always mean it can be easily cracked, just that it is not as secure as other alternatives.
            – Aide
            4 hours ago




            Have a read of: crypto.stackexchange.com/questions/20941/… A crypto protocol being 'insecure' doesn't always mean it can be easily cracked, just that it is not as secure as other alternatives.
            – Aide
            4 hours ago












            up vote
            2
            down vote













            What you are asking for is a known-plain-text attack (KPA). The weakness you describe in ECB is where two encrypted blocks with the same plaintext are encrypted with the same ciphertext.



            This just means you know that two encrypted blocks in the ciphertext look the same, it doesn't mean that you can recover the plain text easily. The answer is: no you will not be able to recover the key.






            share|improve this answer

























              up vote
              2
              down vote













              What you are asking for is a known-plain-text attack (KPA). The weakness you describe in ECB is where two encrypted blocks with the same plaintext are encrypted with the same ciphertext.



              This just means you know that two encrypted blocks in the ciphertext look the same, it doesn't mean that you can recover the plain text easily. The answer is: no you will not be able to recover the key.






              share|improve this answer























                up vote
                2
                down vote










                up vote
                2
                down vote









                What you are asking for is a known-plain-text attack (KPA). The weakness you describe in ECB is where two encrypted blocks with the same plaintext are encrypted with the same ciphertext.



                This just means you know that two encrypted blocks in the ciphertext look the same, it doesn't mean that you can recover the plain text easily. The answer is: no you will not be able to recover the key.






                share|improve this answer












                What you are asking for is a known-plain-text attack (KPA). The weakness you describe in ECB is where two encrypted blocks with the same plaintext are encrypted with the same ciphertext.



                This just means you know that two encrypted blocks in the ciphertext look the same, it doesn't mean that you can recover the plain text easily. The answer is: no you will not be able to recover the key.







                share|improve this answer












                share|improve this answer



                share|improve this answer










                answered 3 hours ago









                Lucas Kauffman

                48.5k1798185




                48.5k1798185






















                    hui shan ki is a new contributor. Be nice, and check out our Code of Conduct.










                    draft saved

                    draft discarded


















                    hui shan ki is a new contributor. Be nice, and check out our Code of Conduct.













                    hui shan ki is a new contributor. Be nice, and check out our Code of Conduct.












                    hui shan ki is a new contributor. Be nice, and check out our Code of Conduct.
















                    Thanks for contributing an answer to Information Security Stack Exchange!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.





                    Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                    Please pay close attention to the following guidance:


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid



                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.


                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function () {
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f199879%2frecover-aes-key%23new-answer', 'question_page');
                    }
                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Quarter-circle Tiles

                    build a pushdown automaton that recognizes the reverse language of a given pushdown automaton?

                    Mont Emei