This gist determines keys for the "RADICORE ENCRYPTION CLASS": http://pastebin.com/2j2G83AH.
It relies on knowing the settings, but not the key.
See the demo.php file for a test situation using weak random keys.
It takes approximately 10 seconds to work out a 50 character random key.
One interesting thing is that there are colliding keys for a given plaintext.
For example:
plaintext:
lz~?xr98Mn/zYqFMUj$VY9By !CeTsh[kM3pvLpS]nY+@rnI&fgv4@l_d)EpO1N^|wne kA4
encrypted with
o#1C4zKf{Bg@v4&lUM7t<F+6:QL~eo(FyBIS
is decryptable with
o#1C4zKf{Bg@v4&lUM7t<F+6:LQ~eo(F$BIR
There are lots of examples:
[VFy,/pm+?7Qouv.,gB0fDv0dB6)nUY_]_ tgFc0k>~7vGX)?X84IJD],}k3p:tDkvi ;b,ex:HyA4fcI%3ow{
%`c=*MGU)f^J+YG/4bG+wm`0$aq6KoKz?cER8E(bm!
%`c=*MGU)f@JsYG/4bG+&1`0$=-6KoKz?cER8E(<1!
etc.
So to derive the exact key, you'd need multiple plaintext/ciphertext pairs.