Quote:
Two problems:
1) The 2h file is encrypted and checksummed;
2) The format of the 2h file prior to encryption is not public knowledge.
|
While I'm not a cryptanalyst,

I suggest you search the net for "chosen plaintext attack".
Apologies to the Moderators if mentioning this is a no-no.