

Next I would like to be able to detect that the RNG is running in a tiny set or not really random. I don't have access to the source code.Īt least I would like to be able to detect that the file is not encrypted.the key is not known (in the case I am interested in, I want to check that all files are really and correctly encrypted, but I could play with specifically designed ones),.the algorithm is pretended to be AES, but might be implemented correctly or not, or worse something else,.the encryption mechanism is reversible (this isn’t a signature),.I would like to audit how an implementation of an encryption algorithm is really performed with the following given data of the problem:
