Author

Topic: Decipher Password from Unencrypted Backup? (Read 1429 times)

hero member
Activity: 672
Merit: 504
a.k.a. gurnec on GitHub
September 05, 2014, 10:20:58 AM
#3
In short, no.

If I understand you correctly, you're looking for one of two things:

1. A "known plaintext attack" against AES: there is no known such attack (not any that are practical, anyways).
2. Is it possible to figure out keys in a MultiBit wallet if you know some of the earlier keys: no, for MultiBit wallets the keys are each independently generated and are not related to one another in any way.

If you know enough about the password, or if you think you managed to make the same typo twice, a password recovery tool might help (take a look at the other recent posts in this forum).
newbie
Activity: 32
Merit: 0
August 25, 2014, 01:35:09 PM
#2
I will add that I do have 3 different ciphertext/plaintext combos, if that might make it feasible. It looks impossible to do with only one encrypted file/ciphertext and plaintext file.
newbie
Activity: 32
Merit: 0
August 25, 2014, 12:18:42 PM
#1
Here is my predicament. I created a new address and password protected my wallet file.

I have an unencrypted backup of the wallet file prior to creating the new address. I also have the encrypted rolling backup of the unencrypted wallet file.

My question is there anyway to decipher any part of my password given that I have the encrypted and unencrypted file, but not the password.

I do have several passwords I typically use however I am thinking I fat fingered the entry on my new keyboard. So if I can decipher any part of the password by comparing the unencrypted and encrypted file, it would help me figure out which password I used. I do not have any experience with cryptography, but maybe I am getting a very expensive lesson Sad
Jump to: