Stone's Crack Me.

This crackme utillizings a calibrated approach much like my first crack me. 
However while my first crack used a simple and easily reversed algorithm 
calibrated with a value which could be reached with in seconds by bruteforce
this one utillizes RC4 professional encryption as it's implemented by the
MicroSoft CryptoApi. Notice the Crypto-Api is avaible only on NT, and win9x
from OSR2 and better - or if you installed MS internet explorer 3.02 or better.
Calculating the serial number on such a crack me is possible ofcause but it 
will be a task far beyound what most crackers would go thru or even have 
resources to.

Here it's implemented as a keyfile. Obviously the algorithm isn't hung on 
reading the serial off the disk - rather it could use keyboard input, dongles,
other hardware devices such as CD's, floppy disks....

Also using such an algorithm for runtime encryption, while obviously possible,is
a bad idea. It's too slow - and since the password needs to be present for 
runtime encryption anyway it does not add much strength to the encrypter.

I left it to an exercise for the reader to crack it. The file in the 
.\uncracked directory is calibrated to a password. Find it.

The password for the cracked one is '12345678'

One comment should be given to this algorithm. The major reason why such 
algorithms are not a real choice for protectors thru out the world is because
some countries have import restrictions on crypthographic technology making a
product using this technology illegal to import into for instance France. Not
to mention - some export restrictions apply as well!

2nd&mi 
Stone 1998

Email: stone@one.se
http://www.cracking.net
