MVC
September 19th, 2011, 21:25
Hi,
I'm working on a project to try to learn more about how file encryption works. I'm using a program (FlipAlbum 7) to burn an encrypted CD containing some jpeg files. For those unfamiliar with FlipAlbum, when you burn a CD containing photos it also writes a small program to the disc that is used for viewing the photos on another computer, without the user having direct access to the jpegs. So after I burn the disc, I rip the files from it so that I have the .exe that launches when you insert the disc, some dll's, and a folder containing all the encrypted jpeg's. What I am attempting to do is open the .exe in OllyDbg, find the code that retrieves the encrypted photo, and then find the algorithm that the program uses to decrypt the files in order to view them.
So my question is, am I correct in assuming that the program actually decrypts the file in order to view it? I would love to be able to extract the algorithm that it uses to decrypt the files, and see how it works step-by-step. It's all fun and games, but I need to know if it's actually possible. What do you guys think, am I on the right track or am I missing something totally important about the way these programs work?
I'm working on a project to try to learn more about how file encryption works. I'm using a program (FlipAlbum 7) to burn an encrypted CD containing some jpeg files. For those unfamiliar with FlipAlbum, when you burn a CD containing photos it also writes a small program to the disc that is used for viewing the photos on another computer, without the user having direct access to the jpegs. So after I burn the disc, I rip the files from it so that I have the .exe that launches when you insert the disc, some dll's, and a folder containing all the encrypted jpeg's. What I am attempting to do is open the .exe in OllyDbg, find the code that retrieves the encrypted photo, and then find the algorithm that the program uses to decrypt the files in order to view them.
So my question is, am I correct in assuming that the program actually decrypts the file in order to view it? I would love to be able to extract the algorithm that it uses to decrypt the files, and see how it works step-by-step. It's all fun and games, but I need to know if it's actually possible. What do you guys think, am I on the right track or am I missing something totally important about the way these programs work?