Leggings in the dark will lead you to madness. There are some algorithms that, given current understanding, might not hope to infer the internal work between the present and the [predicted] end of the universe without knowing the exact information (potentially including private keys or internal state). Of course, some of these algorithms are the basis of modern cryptography.
If you know in advance that there is a sample that needs to be opened, sometimes there are ways to get closer to it. For example, if a dataset contains several input values that differ by 1, compare the corresponding output values:
7262627 -> 8172
7262628 -> 819
7262629 -> 1732
...
7262631 -> 3558
It is pretty clear here (given a few minutes and the calculator) that when the input increases by 1, the output increases by 913 modulo 8266 (i.e. a simple linear congruent generator ).
Differential cryptanalysis is a relatively modern technique used to analyze the strength of cryptographic block ciphers, based on a similar but more complex idea, where the encryption algorithm is known, but suggested that the secret key is not. Input blocks that differ from each other by one bit are considered, and the effect of this bit is traced through a cipher to determine how likely each output bit is to "flip".
Other ways to approach this problem would be to look at extremes (maximum, minimum values), distribution (leading to frequency analysis ), direction (numbers always increase? Decrease?) And (if allowed) consider the context in which the data sets were found . For example, some types of PIN codes always contain a repeating number to make them easier to remember (I'm not saying that a PIN code can necessarily be derived from anything else - just repeating a number is another number to worry about!) .
Simonj
source share