Dark Bit Factory & Gravity
GENERAL => General chat => Topic started by: combatking0 on May 13, 2011
-
I would like to lay down a challenge to the other forum members, just for fun. I have sent Shockwave a copy of my new encoding program. He and I will have a discussion, in code, and we will see who can crack the code first.
It's really tough, but from what I've seen, we have a lot of skillful people here, so I reckon at least 1 person should be able to crack it without access to the source code.
Good luck!
IPHab raQ'X l9On OLXf NxNK Rv FA. DZr leyEC18 6AT UfeD5t yUvhHqFk 50FU31MG8, lYqXaI'2 pg1 zI3ur? mFEa IUXyjG AHc6cA Ekz L5s4 Xvl snqA TkGd7f4WF4 JA fa zG5F m3Bsl oA T4AdjekSLukx PHQ.
-
So, if I have understood well, the only way to crack it, is using a kind of bruteforce ...
Or, it's with the discussion with shockwave that we can have details to know how to reverse it ?
-
Yeah I'm a little confused myself. The letters are shifted around (probably by their ASCII values) but there's no recurring patterns. So I guess there is a certain pattern used for the shifts, probably a codeword. That's -like you said- not exactly easy to crack then. raQ'X could be isn't, Rv FA to do and lYqXaI'2 maybe couldn't or wouldn't. That's just some random guesses for a start. If you don't know how things are done and you don't have a program and a debugger other than your brain, it's probably just - and sorry no offense intended :)- a waste of time.
-
Alan Turing had only his brain to start, but you've got one word (raQ'X) correct. However, it isn't as straitforward as that ;)
The more replies in the conversation, the more grammatical clues you'll have to work with.
I'll drop in another clue - there is a recurring pattern, but it's 916132832 characters long...
-
That number is 62 to the power 5. And there are 26+26+10=62 symbols in your alphabet. But I suspect even if you gave us the full decrypted text we couldn't tell how you did it.
Jim
-
First, raQ'X if it is as it, in the original text, I will not be able to reverse the algorithm. (after search on Google, raQ'X is nothing revelant to me)
Secondly, I will spot only easy + / - rotation on ascii values.
And finally, I will try to break it ... soon, if time let me to do it ... maybe by doing some kind of bruteforce on ascii value ... to help me to direct my shoots. I mean, maybe some results will look interesting ...
In fact, if the algorithm is rotating (let's say + X and X changes every letters) at some point, a bruteforce will be able to decript one word by just random ... if we are adding a dictionnary correction ... (or google approching result)
But, of course, this is just a silly way to process it, and will take long (to code, or to approach good results).
Since I am doing genetic algorithms since some times, it could be a good use of it ... (key generated with the genetic algorithm, scoring done if the results approach something correct ... but the something correct can be perfectly done by humans only ... so )
and last try ... I have copy paste the text in my hexa editor ... just to know :D
but nothing particular at first sight
Binary wise can be interesting too ... like a new way of counting ...
-
lYqXaI'2 pg1 zI3ur?
Given the conversation structure of this snippet I'd guess that pg1 is 'you'
-
Jim has used my clue wisely.
I'm glad to see LittleWhite is up for the challenge. There's no rush, take as long as you need. Nobody will crack this on one message - I'm waiting for Shockwave's reply :)
Bj has guessed correctly...
You're chipping away at my encryption faster than I thought, and I know how to improve it for the next version, though not for the next message - the encryption method will remain the same until it is cracked. Still, the mods at FaceBook will have a tougher time with this ;D
(edit) I've been in contact with Shockwave and he says he'll be back tomorrow, hopefully.
-
While you are at it you can try to solve this one too:
removed ;)
Edit: Forget it, this was unsolvable due to a smelling pistake. Plus there's some bug in my code which somehow fucks up the decryption. Conclusion: don't drink and code. ::) Anyway, looking forward to see LittleWhite's brute force attempt in action. :)
-
I'm waiting for Shockwave's reply
??
Sorry was I meant to do something? :)
-
Sorry, I'd sent you a PM asking if we could have a conversation in code.
I could change it to me typing something. I have some idea of how to make it make sense. I'll start again:
3ReackLjPn2a
QjZ bI7x U1 9et 79bbMXkP 4o1E LWzZ HGl7nsVN9jU2 kAr EV1 k1 yrv zotpZB3 6E264Yq Wt xKe8q 36Wg5N eYGRD WnN9liA sW Xvl kR6o ag dXj jSxQj znFQCx. rMC gkc j1jtHc JzU YRjwF QXhO, br3 2Ge U7VN Olm QPwEwcfQOl kgw fTxsKme FRi Jd2TSBw aX ErfHY 9wFqyRW, X9O gc6DUVQG IdGy 5M3GH1 3s w 3nJqf Kha a8r Ru2vLUqGka zHJ5N 9StOfA8.
4YvO5YoGXH 5du lH2FQ oCqO iSQeY, Aagdk 54tS fkO i2lLv RkTOhxd. V 1PyVGA3 uf4jYC Wlu, eR TQT6k kz Fwl JSJx-gpMF xEQ BF WD4i3kVPre, uksUZap CS zlC4 n N3XO. oFAIxBR as4byj Rc W nGFDRPz gVWvkvT, 2DY Q8 1mc eWX9 gx gVYtVGQ, 6Bz ZrDJZ fY ehXH E1B HUlsSx I1E rfv9l pE5K jf Big9MFS 6yGWD4.
DYS waObUK xoG qRGH7yU EfJM uuA4 LLzLm 4TIPoHJ sLliy jGN yRnhg, KNJ TTVo HL59 mQLtl kPjSy4e 0sZ AM4tJ HF A dbm HGm9ieY 7A aAe9D 8nZJgFc. 2ELXG2P Y1it pP, TG5xk n4BO O7L K0o5fG. Wut 0ui XJI CyO - gDw ow5GJ hfK - raZ TKV EV9 SCnM. pmw Mwz 9Wr 0GeTEQ LYiYyz vfMd m2 0y GVLD nuThX. Loe xQsI VQ8F BpP FbTTDFn i8Xi noe 6nr9 m8W pO40nZ3 FO3gU COx YTo AgswB 0I 2zU qZhI0E 3S H5rU, hFW d2Hp 9KEn CtuZN GFhjO46bKX zy2A w4x 3gycc tw lOGPJ 4jbINb 35nzP xA F41Rb.
-
Ah I see - I'll have to take a look at the program you sent I just haven't had time to do much this weekend :)
-
That's understandable. I'll post a continuation of the above each day until you're ready, just in case anybody wants to try to decode more messages.
-
3 W7er Hno0yE xi - Q Rs5x 56WMk T37k4 yob2C3GF :(
-
I was talking about crypting data with one guys which was doing a XOR using a key as a seed and changing the XOR key every operations ...
Well ... I don't have much time to worry about your game ... which is bad ... hope to have time soon :p
-
3ReackLjPn2a = Introduction?
3 = I
Looks like your cipher always starts at the same place in its cycle.
Jim
-
@Littlewhite - plenty of time. Don't worry about it.
@Jim - Those are correct. I haven't been changing the cycle offset, but there is the option to, just like the grandad of the system I'm using.
-
Both ends of the conversation would need to know that offset before they could share messages?
Jim
-
Correct, but there is a convinient method for this built into the program.
OMYaJ, y7jX L9G fdu xDULa dt4q94R Qd iB j9g3TXW 1GlvIfcy9jRv kG MH 6uQQE7bjwx wSRcDS2 A7 K hWTrr. h 9QJD aEGDrX bWA N2FaYQs THqx9 bGB E4VA J SPYvAw fOQ 0a7fX 0yAx o7BkOBeMiw IlPyFi. tsFVbMb, rsBV Vxda7EaL4 bS kK1Xd NJ khy gDBLC8 dKcG.
-
3ReackLjPn2a = Introduction?
3 = I
So "I" in the first position is always "3"
and "t" becomes "e" in the third
yet "t" becomes "P" in the eigth
and "o" in the fifth becomes "c"
but "o" in the tenth becomes "2"
Looks like a Ceaser Cipher with multiple keys,
With the displacement between each key being dependent on the letter position within the message. Can we assume that the displacement is fixed across keys?
-
That is correct, unless an offset is applied. A certain encoding system allowed for this a long time ago, and exhibited a similar behaviour to what you have observed, but it was decrypted. This is a stronger version of it.
I have also noticed, certain letters in certain places don't appear to encode, but that's because they're mapped to themselves. With this system, it is bound to happen sometimes, even with an offset.
IPH E4rFkj 98yX qOuT Iz5t i5 4VbrHaQ, G7n8y TjX3 SLfF If yhbNZzTOEo89 6MU8D3fZ77. U SE2Kf HjTuFL dFi 6MU8D3fZ7 C0IiO 3c 5msBap x5 v Yho2 Ts9 K Oxjw waDMws 5pCpkfc q1 GIbmx4I r9OJKu8QVGl, sKq CJAUvM dK5XC I2 r pI5oCl1 zc qub Pz 9hWJ H6L 3DLA N5 17jq I1A0u 6aV VTY HonoSBN ID ZBSvaJCxd BI n g6hT uLC2, lK CA rWCa OM3Z zpr4J7 z odZ3Ei BUbrX :(
-
Heres my best stab at the first one:
IPHab raQ'X l9On OLXf NxNK Rv FA.
There isn't much hard work to it.
DZr leyEC18 6AT UfeD5t yUvhHqFk 50FU31MG8, lYqXaI'2 pg1 zI3ur?
The message was hidden secretly Shockwave, couldn't you guese?
mFEa IUXyjG AHc6cA Ekz L5s4 Xvl snqA TkGd7f4WF4 JA fa zG5F
When people unlock the code the text transforms in to this
m3Bsl oA T4AdjekSLukx PHQ.
????? ?? ???????????? you.
[/font]
-
The first 2 words are correct. You have also correctly translated "pg1" into "you" at that location.
The rest needs work, but you're getting there.
nj scz0an, ZlW iAzeIf1 hl9e KNV JqOk6i w0ny PG fdkl fw lD P qH4rx5bN xmPuGL, li9oD PT kgm zn 3rB9og et Ug W2x0ikbsPS Tzo Pta8p9. Y RQhjx Z wyi TQUw wJOGus8 mIhx 4wSEo Knsfe 6P7z.
-
IPH dboH "S-9R7" 1z r DvNl Rs TQTN. xTJ sGE1PGw sLAD wkp wUtgjH OuTFLrJ m8hj v ZkBDk0 9QY0zafzr, V0n 3MW ljI1N5ZwB.
-
IPKB P0mI8we 8WEqAklfF lNPe 4hk4c iJ LaJcv d s6ZF AW JxRE9x. FAr bbffa ib8DN T1 Vw4 Ta5z Uo TAr 5ZPXt, UgN fg0 mcqr0p OdPzt pm 0yk wqZhk cjNM Sb JBF PhZGF. lvl mzRFl O6TGjNj D7z 29h a5u10S Rd 4 Kg4Ry tB6ka.
-
grnsfkdgkndfgn dsfgdfgfd;glsfhfhgdfhgfhgfhbdf gfdg dfgdf gdfgfkhnfhgdh gdhgfhd gfhgfhgf hgfhgdfhgfhd!
-
Ignore my last post, I was just messing ;)
-
Lol.
The next message will really annoy ;)
If anyone does figure this one out in its entirety, you'll find a very useful clue.
yreE://wp8dgEWH6fsF7v.Nv.aS/Getd/nhiYbJg.lE7
-
I'm willing to share the encrypter (but not the source, yet) with the next 1 person to PM me, provided we can have a discussion in code in this thread.
If you are interested, please let me know, and I'll post back here when I have been contacted.
0QH7Qr roc'Z 6j6gSu pKi 7EowZ Y4c6 - ry j8ZPOG fdu FXZUp9, WDd c'h Pq7QEF 5K uNtk tAjbhz K 14HFBE :)
-
Oh dear, it appears you have captured one of my submarines ;)
2MC'am BnyEC eWqqFu FBw b5M tH aMYmQ EuoIvi.
-
3 eXk42 v'Py xC7 1i.
-
2KM, naA fwWP. 11AF uIzl. U++ :)
-
IPuho NmF kg3 uw1 Ubv1J, ZUs. z4 rQO EuJcC 1pX kfjVfD iv 56t4M ljsxfi?
-
ekHh sVyn8 G8GLXgS bp wkp "jtqZS4H9lmer" 093Ps7 bLTf a bEdtv'k JNRdg PjBW88ozFd JMf nQ l6 tDKu jUrNnim. BLwfq6 EMul a5zh BcWfHv EhR y qiGcG Fi DWPcmvDCcS ETm Vk0LR, E2Ud MN'Y RZYF zOCS 6 Rucoc PM sAVJ Wz BAB hmG L1yNw0 gq Bun7oaz Olg dfRPfEU3x Af qg5 TyZIGz uLw CPAu. ;) sDMSDWkaUC SmdZ X9uV 9ZP49jZB K2ksOWIQ Yr12FQ Qr4 vM8 SdITvOBRk wMl6YaY yds ouC Ob888. (7iz R7c Mt CfYxCK r8Z HyBZn Sxl4). V'o lplqe 4yGIl 8YAOTz9Gs8. QMAmzy, pXksck u7y Qweibs0 BN6 UyH4GO! :)
-
IPH abMJm wC39T ZO b jHxD4-ZW1Q rB f4 Jp88EPO T1FzuFO nAl wRD'N Npe1 ejC uh2I. e CWr8O5 mK6V NOM6 0da. H 5EsD2 RD4 Sa8ZFP oa m3xfz koqmkG, r0pn4R 31Lb CSuP2Y hxlxdT9o, cswMuSvl JnuhZ ZF6m3 Ro 6BKgru7 R6T DRZNlS 5t 7 w0COfiaLCp 6AXOug. SS 6ut T4 pNlv 67xkYr79 AE gGo jveWgjve kGEPnF gfvZ4a3, Ri JXRd sN4Lve UVN CRem hz4626t i1tAL. EiBRnmSOxe8, rnU8 3L DJ G1H9A av VwC3A1uW iGrH zYHWTk 9 gzgjs, ftULE7vz, urCG heCBJ iQnE nFBj2qw DIR 3 MtJ2Tb uHniP, rCvbd MeHquk6 bHE5 eFdXsj 4Q 7aWZ0! mIy km1 udKIZ HP mEg1 8iCYoeW N rNxe4. IQfV Rqw 3nC 0OEPs 6gL ehCz e5g dtF zZY hRJZ0, 7IT IFi WL2vA PK b0KB jz1bEF0 D QQEQD, 7EK yP QJ. uoO r3j2I 3rSu HMyg HHE NNgrnO9 emxJaRg2 7X jkYB x2HIF - S ppZoIu jBz LD2T KqjzJ.
Which is how the Enigma Machine worked, in principle.
Shall we use this to post on Facebook ;) Let's see Zuckerberg's anti-privacy measures crack this.
-
Ah okay, I got it now. Thanks for the explanation! :)
And well, Zuckerberg... :whack: ;D
-
I completely forgot this thread. What is the conclusion ?
-
I posted the encrypter / decrypter, and 1 person solved it, though not through the means I was intending.
I've got plans for an even tougher code - I'll have to change how I program it somehow :)