Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 42 |
Nodes: | 6 (0 / 6) |
Uptime: | 01:20:02 |
Calls: | 220 |
Calls today: | 1 |
Files: | 824 |
Messages: | 121,522 |
Posted today: | 6 |
On 12/20/2024 12:35 PM, Stefan Claas wrote:
Hi all,
I recently finished my Doppekastenschluessel-Hex project,
which is a simplified version of the original German WWII
cipher, with hex notation.
For more details check my previous thread 'Seriation'
Your task is to crack the provided message, which uses
only one key for encryption, instead of two (default)
or more.
The message:
75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C
C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6
Please note: The message is written as normal text and
not like plaintext messages from the old days and with
padding applied.
Perhaps we need a larger amount of ciphertext?
On 12/20/2024 12:51 PM, Stefan Claas wrote:
Perhaps we need a larger amount of ciphertext?
That would make cryptanalysis easier, right?
I think so. Depends on the algorithm. If it's secure than perhaps no so much... The interesting aspect of SCOS is that it's not secure at all.
BTW. For drawing the winners, should they been drawn from
a random pool of entries, or by first come first serve?
That is up to you! :^)
Another aspect of SCOS. Richard wanted us to derive an algorithm. If not
just outright copy his C impl which he encrypted and posted. I pissed
him off a bit in that thread. Sigh. Damn!