FANDOM


Now that we know which encryption methods were used on the HALOS code, it's just a matter of figuring our keys, mode and the IV (for the TwoFish method). I (Gunsrequiem) borrowed this info from the table on the Cryptographic Functions page:

  • RC4 (Arcfour):
    • Key: 1 - 256 bytes (8 - 2048 bits)
    • IV: NONE
    • Mode: Stream
  • TwoFish:
    • Key: 1 - 32 bytes (8 - 256 bits)
    • IV: 32 bytes (256 bits)
    • Mode: ECB, CBC, etc.

To assist with this effort, I think it would be best if we ensure we add any keys to this list that we have attempted, as well as (if necessary) the order in which we tried them/which method we applied them to. We may also want to indicate which resource we utilized--so far, I've only used online resources, but user "sfsdfd" on the forums was kind enough to provide some Python scripting for us that we can now employ. For now, I'm going to paste some of the keys that I generated, but haven't used with his script as of yet:

  • BenallohPaillier
  • BENALOHPAILLIER
  • congratulationsyouwonthePIZZA
  • congratulationsyouwontheHALOS
  • HALOS
  • Niobium-5
  • Niobium Pentachloride
  • Cyberax
  • Flood Gates
  • Technopolis
  • Technopolis Tower
  • Ultimax
  • All your friends are no help
  • Welcome to Technopolis
  • Technopolis Air Terminal Arrivals
  • Image Recognition System
  • No threat to security
  • Entry Clearance Authorised
  • Go Cyberax
  • No 32X17 Jean Daniel
  • Sleep Pattern Monitor
  • Beet Juice
  • Elephant or Elephants (at one point, the characters say that this is the key to everything)
  • Don’t think of an elephant!
  • Niobium processors are fast, but organically-grown processors would be faster
  • Roland
  • Human Microchips