You have anyway different techniques for extrapolate the objects from an encrypted source and afterward, trough the encrypted and decrypted object you obtained, come up with the used encryption procedure, but this would require an advanced knowledge.