A quick analysis based on the clues provided by Storm up to now:
Taken from PM:
[b]"It is just an assumption, but one using the available evidence, OTR 4.0 is either a 128bit or 256bit block cipher with an unknown mode and key length. I would assume AES or Rjindael as candidates to allow for the most commonly used (also as Off the Record encryption uses AES as its base algorithm, that may be a hint). So to modify the list -
Level 0 - 2 = Non Encrypted or Encoded (similar to private and confidential?)
Level 3 - 4 = OTR 1 - Base 64 or Base 85 encoded
Level 5 - 6 = OTR 2 - Hyper-encrypted (layered) Pen and Paper Ciphers
Level 7 = OTR 3 - Hyper-encrypted (layered) One Time Pad
Level 8 = OTR 4 - 128bit/256bit block cipher (AES or Rjindael or Twofish or Serpent)
Level 9 = OTR 5 - Cascaded Block Ciphers with salt (SHA 512 or Whirlpool etc)
Level 10 = OTR 6 - Cascaded Block Ciphers with salt and possible key file additions (to increase password strength)"[/b]
He offered this analysis, but he’s also [strike: quoted] paraphrased as saying:
“2. Halos is definitely encrypted (and can be decrypted), but NOT with openssl tools.”
These tips don’t necessarily have to negate each other as it seems at first glance. Here is a list of cipher strings utilized in openssl: strings
In comparison, here is a quick breakdown of Rjindael, which was mentioned in the first tip: Rjindael
Perhaps Storm is simply saying that we need to look at more complicated maneuvering, rather than relying on quick-fix, one-shot decryption measures. Also, based on these bit sizes, isn’t it possible that our key is simply embedded within the Hex code itself?