;;;;;;;;;;;;;;;;;;;;;;;;;;
; -- About crackme #1 -- ;
;;;;;;;;;;;;;;;;;;;;;;;;;;

 Nothing fancy, and further more no anti-stuff :), just needs a little 
 brain and patience to get the job done, all you need to do is make the 
 application work again, no serials are required either, just the 
 application was modified/altered in 2 cases, the first one the sign file 
 was altered the second case the application itself was altered, so in 
 both cases the application itself won't work, unless you can break the
 main encrypted data ;), so a little bit of math would be nice, now i guess 
 i can give you some information about the crackme, anyway where are 
 some info about it.

 The Crackme #1 uses:
 - RIPEMD-160 algorithm
 
 The encryption used for the signature file protection is a little 
 bit complex:
 - Encrypt with Blowfish (Variable keysize from 32 bits up to 448 bits)
 - Encrypt with a *SPECIAL* Protection Algorithm (Encryption in 4 rounds 
   with morphing keys based on plain text, fixed keysize: 20 bytes = 160 bits)
 - Encrypt with Blowfish (Variable keysize from 32 bits up to 448 bits)
 
 The special protection algorithm renders the archive immune against a 
 signature-searching attack. This algorithm encrypts the plaintext with 
 XOR using morphing keys based on the plaintext data.

 The following algorithm has been used to create digital signatures: 
 - RIPEMD-160 Message Digest Algorithm by Antoon Bosselaers (Katholieke 
   Universiteit Leuven)

 Problems facing the cracker, *g* well..., i will leave that for you ;)

 I believe that was more than enough information, now you have a pretty
 good background about it and have fun with it.
