From: WTShaw on 7 Mar 2010 02:12 On Mar 4, 7:48 am, bmearns <mearn...(a)gmail.com> wrote: > > Come to think of it, this cipher might be better suited to stego than > crypto. There are 27! different keys, each being equivalent to 5 > others. So there are effectively 27!/6 different messages that can be > encoded in the choice of a key, which is just over 90.5 bits of > information. An encoding system, using the factoradic number system > for instance, could be used to encode a hidden message into a key. An > innocuous message containing a crib would be encrypted using that key, > and sent to your partner. With the crib, they could recover an > equivalent key rather quickly and easily, and then recover the hidden > 90 bits from that key. An enemy could easily do the same, but > hopefully would think that the message was the important part, and > forget about the key. > > -Brian Consider that for each character you have pools of choices of representations which means at say one letter per word, several combinations of three words with a hot letter in each would allow a better flowing stream of words to be used. I leave you to your imagination to inspire you to puch relative thoughts to something useful. But for the fun of it, here is the application I use in Base64. If you know how to decrypt that and hang together a java script application to make it run, enjoy the exact program that I currently use. PEhUTUw+PEhF QUQ+PFRJVExF PkJMVDwvVElU TEU+CiAgPFND UklQVCB0eXBl PSJ0ZXh0L2ph dmFzY3JpcHQi Pgo8IS0tCgov L0ZVTkNUSU9O IFBST0NFU1Mg ZGVyaXZlcyB0 aGUga2V5IHN0 cmluZyBhbmQg cG9vbHMgb2Yg b3B0aW9ucyBm b3IgZW5jcnlw dGluZyBhbmQg ZGVjcnlwdGlu ZwpmdW5jdGlv biBwcm9jZXNz KGZvcm0scGx1 cyl7dmFyIGlu JCA9ICIiOyBp biQgPSBmb3Jt LnJhdy52YWx1 ZTsKaWYgKChp biQgPT0iIikg JiYgKHBsdXMg PT0gMSkpe3Bs dXMgPSAzO30K aWYgKHBsdXMg PT0gMyl7Zm9y bS5yYXcudmFs dWUgPSAnYWJj ZGVmZ2hpamts bW5vcHFyc3R1 dnd4eXogJzt9 CmlmIChwbHVz ID09IDIpe2Zv cm0ucmF3LnZh bHVlID0gJ1Ro ZSBxdWljayBi cm93biBmb3gg anVtcHMgb3Zl ciB0aGUgbGF6 eSBkb2cuJzt9 CnZhciBiZXRh ID0gbmV3IEFy cmF5KCdhJywn YicsJ2MnLCdk JywnZScsJ2Yn LCdnJywnaCcs J2knLCdqJywn aycsJ2wnLCdt JywnbicsJ28n LCdwJywncScs J3InLCdzJywn dCcsJ3UnLCd2 JywndycsJ3gn LCd5Jywneics Jy8nKTsKdmFy IHggPSAwO3Zh ciByYXcgPSBm b3JtLnJhdy52 YWx1ZTsgZm9y bS50ZXN0ZWQu dmFsdWUgPSAi IjsgdmFyIG5l d291dHB1dCA9 ICIiOwp2YXIg bmV3bGluZSA9 IFN0cmluZy5m cm9tQ2hhckNv ZGUoMTMpOyB2 YXIgY291bnQg PSAiIjsgdmFy IGtvdW50ID0g MDsgdmFyIHNp emUgPSAiIjsK dmFyIGxvd3Jh dz1yYXcudG9M b3dlckNhc2Uo KTsKZm9yICh4 ID0gMDsgeCA8 PSByYXcubGVu Z3RoOyB4Kysp ewp2YXIgaXRl bSA9IGxvd3Jh dy5zdWJzdHJp bmcoeCwgeCsx KTsKaWYgKGl0 ZW0gPT0gJyAn ICYmIHBsdXMg IT0zKXtrb3Vu dCArKztuZXdv dXRwdXQgPSBu ZXdvdXRwdXQg KyAnLyc7fQpp dGVtID0gaXRl bS50b0xvd2Vy Q2FzZSgpOwpp ZiAoaXRlbSA+ PSAnYScgJiYg aXRlbSA8PSAn eicpe2tvdW50 ICsrO25ld291 dHB1dCA9IG5l d291dHB1dCAr IGl0ZW07fX0K dmFyIGhhc2gg PSAiIjsgdmFy IGxldHRlcnMg PSAwOyB2YXIg aGFzaGxlbiA9 IDA7IHZhciB5 ID0gMDsKZm9y ICh4ID0gMDsg eCA8PSBrb3Vu dDsgeCsrKXt2 YXIgaXRlbSA9 IG5ld291dHB1 dC5zdWJzdHJp bmcoeCwgeCsx KTsKICAgZm9y KHkgPSAwOyB5 IDw9IDI3OyB5 Kyspe2lmIChp dGVtID09IGJl dGFbeV0pe2Jl dGFbeV0gPSAi PyI7IGhhc2gg PSBoYXNoICsg aXRlbTsgbGV0 dGVycysrO319 fSAKc2l6ZSA9 IGxldHRlcnM7 Zm9yKHkgPSAw OyB5IDw9IDI2 OyB5Kyspe2lm IChiZXRhW3ld ICE9ICI/Iil7 aGFzaCA9IGhh c2ggKyBiZXRh W3ldO319Cmhh c2tleSA9IDE7 IGtleSQgPSBo YXNoOyB2YXIg cG9vbHMgPSBu ZXcgQXJyYXko KTsgcG9vbHNb MF0gPSAiIjsg cG9vbHNbMV0g PSAiIjsgcG9v bHNbMl0gPSAi IjsKZm9yICh4 ID0gMDsgeCA8 PSAyNzsgeCs9 Myl7cG9vbHNb MF0gPSBwb29s c1swXSArIGhh c2guc3Vic3Ry aW5nKHgseCsx KTsKICAgcG9v bHNbMV0gPSBw b29sc1sxXSAr IGhhc2guc3Vi c3RyaW5nKHgr MSx4KzIpOyAK ICAgcG9vbHNb Ml0gPSBwb29s c1syXSArIGhh c2guc3Vic3Ry aW5nKHgrMix4 KzMpO30KZm9y bS50ZXN0ZWQu dmFsdWUgPSAg IkF2YWlsYWJs ZSBLZXk6ICIg KyBoYXNoLnN1 YnN0cmluZygw LCAzKSArICIg IiArIGhhc2gu c3Vic3RyaW5n KDMsIDYpICsg IiAiICtoYXNo LnN1YnN0cmlu Zyg2LCA5KSAr ICIgIiAraGFz aC5zdWJzdHJp bmcoOSwgMTIp ICsgIiAiICsg aGFzaC5zdWJz dHJpbmcoMTIs IDE1KSArICIg IiArIGhhc2gu c3Vic3RyaW5n KDE1LCAxOCkg KyAiICIgK2hh c2guc3Vic3Ry aW5nKDE4LCAy MSkgKyAiICIg KyBoYXNoLnN1 YnN0cmluZygy MSwgMjQpICsg IiAiICsgaGFz aC5zdWJzdHJp bmcoMjQsIDI3 KSArIG5ld2xp bmUgKyAiUG9v bHM6IDEgPSAi ICsgcG9vbHNb MF0gKyAiLCAy ID0gIiArIHBv b2xzWzFdICsg IiwgMyA9ICIg KyBwb29sc1sy XTsgZm9ybS5j aGFuY2UudmFs dWUgPSAicmFu ZG9taXplciI7 IGZvcm0uaGFz a2V5LnZhbHVl ID0gMTt9Cgpm dW5jdGlvbiBl bmNyeXB0KGZv cm0sIHhjKXt2 YXIgaGFzaXQg PSAiIjsgaGFz aXQgPSBmb3Jt Lmhhc2tleS52 YWx1ZTsKaWYg KGhhc2l0KXt2 YXIgeCA9IDA7 IHZhciBjb3Vu dCA9ICIiOyB2 YXIgdGVtcCA9 ICIiOyAKIHZh ciBrb3VudCA9 IDA7IHZhciBw MSA9IDA7IHZh ciBwMiA9IDA7 IHZhciBwMyA9 IDA7dmFyIGFk ZGVyID0gMzsg CnZhciBhdm9p ZCQgPWZvcm0u bm9ubyQudmFs dWU7IHZhciBz ZWVkJD1mb3Jt LmNoYW5jZS52 YWx1ZTsKdmFy IGxlbnNlZWQk ID0gc2VlZCQu bGVuZ3RoOyB2 YXIgdGFyZ2V0 JD0iIjsgdmFy IGxlbmF2b2lk JCA9IGF2b2lk JC5sZW5ndGg7 IG1lZG1haW49 IiI7CnZhciBu ZXdpbmRleCA9 IDA7IHZhciBu ZXdjaGFyID0g IiI7IHZhciB6 ID0gMDsgdmFy IE9LbG9jID0g MDsgdmFyIE5P bG9jOwp2YXIg cG9vbHMgPSBu ZXcgQXJyYXko KTsgcG9vbHNb MF0gPSAiIjsg cG9vbHNbMV0g PSAiIjsgcG9v bHNbMl0gPSAi IjsgdmFyIHRy aXQgPSBuZXcg QXJyYXkoKTsK Zm9yICh4ID0g MDsgeCA8PSAy NzsgeCs9Myl7 CiAgICBwb29s c1swXSA9IHBv b2xzWzBdICsg a2V5JC5zdWJz dHJpbmcoeCx4 KzEpOwogICAg cG9vbHNbMV0g PSBwb29sc1sx XSArIGtleSQu c3Vic3RyaW5n KHgrMSx4KzIp OwogICAgcG9v bHNbMl0gPSBw b29sc1syXSAr IGtleSQuc3Vi c3RyaW5nKHgr Mix4KzMpO30K dmFyIHBvb2wk ID0gcG9vbHNb MF0gKyBwb29s c1sxXSArIHBv b2xzWzJdO3Zh ciBtYWluID0g Zm9ybS5taWRk bGUudmFsdWU7 CmZvcm0ubWFp bi52YWx1ZSA9 ICIiOyBtZWRt YWluID0gbWFp bi50b1VwcGVy Q2FzZSgpOwp2 YXIgbG93bWFp bj1tZWRtYWlu LnRvTG93ZXJD YXNlKCk7IHZh ciBzcHMgPSAx OwogZm9yICh4 ID0gMDsgeCA8 PSBtYWluLmxl bmd0aDsgeCsr KXt2YXIgaXRl bSA9IGxvd21h aW4uc3Vic3Ry aW5nKHgsIHgr MSk7IGlmIChp dGVtID09ICIs Iil7aXRlbSA9 ICIvaiI7fQog ICBpZiAoaXRl bSA9PSAiPyIp e2l0ZW0gPSAi L3EiO30gCiAg IGlmIChpdGVt ID09ICIuIil7 aXRlbSA9ICIv eC8iO30KICAg aWYgKGl0ZW0g PT0gIjAiKXtp dGVtID0gIi96 ZXJvLyI7fQog ICBpZiAoaXRl bSA9PSAiMSIp e2l0ZW0gPSAi L29uZS8iO30g CiAgIGlmIChp dGVtID09ICIy Iil7aXRlbSA9 ICIvdHdvLyI7 fQogICBpZiAo aXRlbSA9PSAi MyIpe2l0ZW0g PSAiL3RocmVl LyI7fQogICBp ZiAoaXRlbSA9 PSAiNCIpe2l0 ZW0gPSAiL2Zv dXIvIjt9IAog ICBpZiAoaXRl bSA9PSAiNSIp e2l0ZW0gPSAi L2ZpdmUvIjt9 CiAgIGlmIChp dGVtID09ICI2 Iil7aXRlbSA9 ICIvc2l4LyI7 fQogICBpZiAo aXRlbSA9PSAi NyIpe2l0ZW0g PSAiL3NldmVu LyI7fSAKICAg aWYgKGl0ZW0g PT0gIjgiKXtp dGVtID0gIi9l aWdodC8iO30K ICAgaWYgKGl0 ZW0gPT0gIjki KXtpdGVtID0g Ii9uaW5lLyI7 fQogICBpZiAo aXRlbSA9PSAi LSIpe2l0ZW0g PSAiL2Rhc2gv Ijt9CiAgIGlm IChpdGVtID09 ICI9Iil7aXRl bSA9ICIvZXF1 YWxzLyI7fQog ICBpZiAoaXRl bSA9PSAiKyIp e2l0ZW0gPSAi L3BsdXMvIjt9 IAogICBpZiAo aXRlbSA9PSAi QCIpe2l0ZW0g PSAiL2F0LyI7 fQogICBpZiAo aXRlbSA9PSAi JSIpe2l0ZW0g PSAiL3BlcmNl bnQvIjt9CiAg IGlmIChpdGVt ID09ICI8Iil7 aXRlbSA9ICIv bGVzcyB0aGFu LyI7fQogICBp ZiAoaXRlbSA9 PSAiPiIpe2l0 ZW0gPSAiL2dy ZWF0ZXIgdGhh bi8iO30KICAg aWYgKGl0ZW0g PT0gIiQiKXtp dGVtID0gIi9k b2xsYXJzLyI7 fSAKICAgaWYg KGl0ZW0gPT0g IjsiKXtpdGVt ID0gIi9zZW1p Y29sb24iO30K ICAgaWYgKGl0 ZW0gPT0gIjoi KXtpdGVtID0g Ii9jb2xvbi8i O30KICAgaWYg KGl0ZW0gPT0g IiMiKXtpdGVt ID0gIi9uci8i O30KICAgaWYg KGl0ZW0gPT0g IiYiKXtpdGVt ID0gIi9hbmQv Ijt9CiAgIGlm IChpdGVtID09 ICIvIil7aXRl bSA9ICIvc2xh c2gvIjt9IAog ICBpZiAoaXRl bSA9PSAiISIp e2l0ZW0gPSAi L2V4Y2xhbWF0 aW9uL21hcmsv Ijt9CiAgIGlm IChpdGVtID09 ICIqIil7aXRl bSA9ICIvYXN0 cmljay8iO30K ICAgaWYgKGl0 ZW0gPT0gIl4i KXtpdGVtID0g Ii9wb3dlci8i O30KICAgaWYg KGl0ZW0gPT0g IigiKXtpdGVt ID0gIi9sZWZ0 cGFyLyI7fQog ICBpZiAoaXRl bSA9PSAiKSIp e2l0ZW0gPSAi L3JpZ2h0cGFy LyI7fQogICBp ZiAoaXRlbSA9 PSAiICIgJiYg c3BzID09IDEp e2l0ZW0gPSAi JCI7fQogICBp ZiAoaXRlbSA9 PSAiICIgJiYg c3BzID09IDAp e2l0ZW0gPSAi LyI7IHNwcyA9 IDE7dGVtcCA9 IHRlbXAgKyBp dGVtO30KICAg aWYgKGl0ZW0g IT0gIi8iICAm JiBpdGVtICE9 ICIkIil7c3Bz ID0gMDsgdGVt cCA9IHRlbXAg KyBpdGVtO319 c3BzID0gMTsg dmFyIHRlbXAy ID0gIiI7CiAg Zm9yICh4ID0g MDsgeCA8PSB0 ZW1wLmxlbmd0 aDsgeCsrKXt2 YXIgaXRlbSA9 IHRlbXAuc3Vi c3RyaW5nKHgs IHgrMSk7CiAg aWYgKGl0ZW0g PT0gIi8iICYm IHNwcyA9PSAw KXt0ZW1wMiA9 IHRlbXAyICsg aXRlbTsgc3Bz ID0gMTt9CiAg aWYgKGl0ZW0g Pj0gImEiICYm IGl0ZW0gPD0g InoiKXt0ZW1w MiA9IHRlbXAy ICsgaXRlbTsg c3BzID0gMDt9 fQp2YXIgaXRl bWxvYyA9ICIi OyB0ZW1wID0g IiI7IHZhciBu cjkgPSAwOyB2 YXIgbnIzID0g MDsgIHZhciBu cjEgPSAwOyB2 YXIgbnIkID0g IiI7IHZhciBj Yz0wOwpmb3Ig KHggPSAwOyB4 IDw9IHRlbXAy Lmxlbmd0aC0x OyB4Kyspe3Zh ciBpdGVtID0g dGVtcDIuc3Vi c3RyaW5nKHgs IHgrMSk7IHZh ciB0cml0JCA9 ICIiOwogIGl0 ZW1sb2MgPSBr ZXkkLmluZGV4 T2YoaXRlbSk7 CnRyaXRbMF0g PSAwOyBpZiAo aXRlbWxvYyA+ IDgpe3RyaXRb MF0gPSAxOyBp dGVtbG9jIC09 IDk7IGlmIChp dGVtbG9jID4g OCl7dHJpdFsw XSA9IDI7IGl0 ZW1sb2MgLT0g OTt9fQp0cml0 WzFdID0gMDsg aWYgKGl0ZW1s b2MgPiAyKXt0 cml0WzFdPSAx OyBpdGVtbG9j IC09IDM7IGlm IChpdGVtbG9j ID4gMil7dHJp dFsxXSA9IDI7 IGl0ZW1sb2Mg LT0gMzt9fQp0 cml0WzJdID0g aXRlbWxvYzsg CmZvciAoeSA9 IDA7IHk8PTI7 IHkrKyl7dGFy Z2V0JCA9IHBv b2xzW3RyaXRb eV1dOwpmb3Ig KHogPSAxOyB6 PDEwMDsgeisr KXsKbmV3aW5k ZXggID0gIChr ZXkkLmluZGV4 T2Yoc2VlZCQu Y2hhckF0KDAp KSArIGtleSQu aW5kZXhPZihz ZWVkJC5jaGFy QXQoMSkpICsg YWRkZXIpICUg Mjc7Cm5ld2No YXIkID0ga2V5 JC5jaGFyQXQo bmV3aW5kZXgp OyBzZWVkJCA9 IHNlZWQkLnN1 YnN0cmluZyAo MSxsZW5zZWVk JCkgKyBuZXdj aGFyJDsKT0ts b2MgPSB0YXJn ZXQkLmluZGV4 T2YobmV3Y2hh ciQpOyBpZiAo KG5ld2NoYXIk ID09ICIvIil8 fCgobmV3Y2hh ciQgPT0gaXRl bSkmJih4YyA9 PTEpKSl7T0ts b2MgPSAtMTt9 Tk9sb2MgPSBh dm9pZCQuaW5k ZXhPZihuZXdj aGFyJCk7IGlm IChOT2xvYyA+ IC0xKXtPS2xv YyA9IC0xO30K aWYgKE9LbG9j Pi0xKXt6PTEw MDt9fQphdm9p ZCQgPSBhdm9p ZCQuc3Vic3Ry aW5nICgxLGxl bmF2b2lkJCkg KyBuZXdjaGFy JDsgdGVtcCA9 IHRlbXAgKyBu ZXdjaGFyJDt9 fQogIHRlbXAy ID0gIiI7IHkg PSAwOwogIGZv ciAoeCA9IDA7 IHggPD0gdGVt cC5sZW5ndGg7 IHgrKyl7dmFy IGl0ZW0gPSB0 ZW1wLnN1YnN0 cmluZyh4LCB4 KzEpOwogIHRl bXAyID0gdGVt cDIgKyBpdGVt OyB5Kys7IGlm KHkgPT0gNSl7 dGVtcDIgPSB0 ZW1wMiArICIg IjsgeSA9IDA7 fX0KZm9ybS5t YWluLnZhbHVl ID0gdGVtcDI7 IGZvcm0uY2hh bmNlLnZhbHVl ID0gc2VlZCQ7 Zm9ybS5ub25v JC52YWx1ZT1h dm9pZCQ7fX0K Ci8vRlVOQ1RJ T04gREVDUllQ VCByZWNvdmVy cyBwbGFpbnRl eHQgZnJvbSBj aXBoZXJ0ZXh0 CmZ1bmN0aW9u IGRlY3J5cHQo Zm9ybSl7dmFy IGhhc2l0ID0g IiI7IGhhc2l0 ID0gZm9ybS5o YXNrZXkudmFs dWU7CmlmICho YXNpdCl7dmFy IHRlbXAkID0g Zm9ybS5taWRk bGUudmFsdWU7 IHZhciB4ID0g MDsgdmFyIGtv dW50ID0gMDsg dmFyIGMkID0g IiI7CnZhciBh JCA9ICIiOyB2 YXIgc2luZ2xl dG9uID0gbmV3 IEFycmF5KCk7 IGxldHRlcmFk ciA9IDA7IHZh ciBsb2NOc3Ry ID0gMDsgdCQg PSAiICI7CnZh ciBkJCA9IGZv cm0udGVzdGVk LnZhbHVlO2Qk PSBkJC5zdWJz dHJpbmcoMTUs NTApOyB2YXIg ZSQgPSAiIjsK dmFyIHBvb2xz ID0gbmV3IEFy cmF5KCk7IHBv b2xzWzBdID0g IiI7IHBvb2xz WzFdID0gIiI7 IHBvb2xzWzJd ID0gIiI7CmZv ciAoeCA9IDA7 IHggPD0gMjc7 IHgrPTMpewog ICAgcG9vbHNb MF0gPSBwb29s c1swXSArIGtl eSQuc3Vic3Ry aW5nKHgseCsx KTsKICAgIHBv b2xzWzFdID0g cG9vbHNbMV0g KyBrZXkkLnN1 YnN0cmluZyh4 KzEseCsyKTsK ICAgIHBvb2xz WzJdID0gcG9v bHNbMl0gKyBr ZXkkLnN1YnN0 cmluZyh4KzIs eCszKTt9CnZh ciBwb29sJCA9 IHBvb2xzWzBd ICsgcG9vbHNb MV0gKyBwb29s c1syXTt0ZW1w JCA9IHRlbXAk LnRvTG93ZXJD YXNlKCk7CmZv ciAoeCA9IDA7 IHggPD0gdGVt cCQubGVuZ3Ro OyB4Kyspe3Zh ciBiJCA9IHRl bXAkLnN1YnN0 cmluZyh4LCB4 KzEpOwogICBp ZiAoYiQgPj0g J2EnICYmIGIk IDw9ICd6Jyl7 c2luZ2xldG9u W2tvdW50XSA9 IGIkO2tvdW50 ID0ga291bnQg KyAxO30KICAg aWYgKGtvdW50 ID09IDMpe2tv dW50ID0gMDsg bGV0dGVyYWRy ID0gMDsKICAg IGxvY05zdHIg PSBwb29sJC5p bmRleE9mKHNp bmdsZXRvblsw XSk7CiAgICBp Zihsb2NOc3Ry ID44KXtsZXR0 ZXJhZHIgKz0g OTsgaWYobG9j TnN0ciA+IDE3 KXtsZXR0ZXJh ZHIgKz0gOTt9 fQogICAgbG9j TnN0ciA9IHBv b2wkLmluZGV4 T2Yoc2luZ2xl dG9uWzFdKTsK ICAgIGlmKGxv Y05zdHIgPjgp e2xldHRlcmFk ciArPSAzOyBp Zihsb2NOc3Ry ID4gMTcpe2xl dHRlcmFkciAr PSAzO319CiAg ICBsb2NOc3Ry ID0gcG9vbCQu aW5kZXhPZihz aW5nbGV0b25b Ml0pOwogICAg aWYobG9jTnN0 ciA+OCl7bGV0 dGVyYWRyICs9 IDE7IGlmKGxv Y05zdHIgPiAx Nyl7bGV0dGVy YWRyICs9IDE7 fX0gICAKICAg IHQkID0ga2V5 JC5jaGFyQXQo bGV0dGVyYWRy KTsgaWYodCQg PT0gIi8iKXt0 JCA9ICIgIjt9 CiAgICBjJCA9 IGMkICsgdCQ7 fX0KYSQgPSAg YSQgKyBjJDtm b3JtLm1haW4u dmFsdWUgPSBh JDsgfX0KCi8v RlVOQ1RJT04g SU5TVFJVQ1RJ T05TIGRpc3Bs YXlzIEJMVCBo ZWxwcwpmdW5j dGlvbiBpbnN0 cnVjdGlvbnMo Zm9ybSl7dmFy IGEkID0gIjAu IE1ha2UgYSBL RVkgZnJvbSBh IHNlbnRlbmNl IG9yIG90aGVy IG1lbW9yYWJs ZSBzZXF1ZW5j ZSBvZiBsZXR0 ZXJzOyAxLiBF bnRlciBhIG1l c3NhZ2UgdG8g YmUgdHJhbnNm b3JtZWQgaW50 byB0aGUgSU5Q VVQgZmllbGQ7 IDIuIEVOQ1JZ UFQgUGxhaW50 ZXh0IHRvIGdl dCBDaXBoZXJ0 ZXh0IG9yIERF Q1JZUFQgQ3lw aGVydGV4dCB0 byByZWNvdmVy IHRoZSBvcmln aW5hbCBQbGFp bnRleHQ7IDMu IEF1dG9tYXRp Y2FsbHkgZHVy aW5nIGVuY3J5 cHRpb24sIERp Z2l0cyAwLTkg YW5kIHNvbWUg c3ltYm9scyBh cmUgY29udmVy dGVkIHRvIHdv cmRzLCBlYWNo IENvbW1hIGJl Y29tZXMgYSBK LCBlYWNoIFF1 ZXN0aW9uIE1h cmsgYmVjb21l cyBhIFEsIGFu ZCBlYWNoIFBl cmlvZCBiZWNv bWVzIGFuIFg7 IDQuIE51bWVy YWxzIGFuZCBQ dW5jdHVhdGlv biBkbyBub3Qg cmV2ZXJ0IHRv IHRoZWlyIG9y aWdpbmFsIHN0 YXR1cyB3aGVu IHRoZSBwbGFp bnRleHQgaXMg ZmluYWxseSBy ZWNvdmVyZWQg YnV0IHJlbWFp biBhcyBsb3dl ciBjYXNlIHdv cmRzIGFuZCBs ZXR0ZXJzIHdp dGggdGhlIHJl c3Qgb2YgdGhl IG1lc3NhZ2U7 IDUuIE11bHRp cGxlIFNwYWNl cywgTGluZSBS ZXR1cm5zLCBh bmQgYWxsIG5v bi1hbHBoYWJl dGljIGNoYXJh Y3RlcnMgYXJl IGRlbGV0ZWQg YW5kL29yIGln bm9yZWQ7IDYu IE5lY2Vzc2Fy eSBTcGFjZXMg YW5kIEFscGhh YmV0aWMgTGV0 dGVycyBhcmUg ZWFjaCByZXBy ZXNlbnRlZCBi eSB0aHJlZSBz ZXF1ZW50aWFs IGxldHRlcnMg c28gdGhhdCB0 aGVyZSBhcmUg aHVuZHJlZHMg b2YgdGhyZWUt bGV0dGVyIGNv bWJpbmF0aW9u cyBmb3IgZWFj aCBwbGFpbnRl eHQgY2hhcmFj dGVyIG9yIHNw YWNlIGFzIGRl dGVybWluZWQg YnkgdGhlIGtl eSAoVGhlIFJh bmRvbSBLZXkg aXMgdXNlZCB0 byBoZWxwIHBp Y2sgd2hpY2gg ZXhhY3QgcmVw cmVzZW50YXRp b25zIGFyZSBz ZWxlY3RlZCBp biBFbmNyeXB0 aW9uIGJ1dCBp dCBpcyBub3Qg bmVjZXNzYXJ5 IHRvIGtub3cg aXQgaW4gRGVj cnlwdGlvbik7 IDcuIFRoaXMg cGFydGljdWxh ciBpbXBsZW1l bnRhdGlvbiB1 c2VzIHRoZSBw YW5ncmFtIG1l dGhvZCB0byBy ZWZpbmUgYSBr ZXkgaW5wdXQg c3RyaW5nLCBo YXJ2ZXN0cyB0 aGUgZmlyc3Qg b2NjdXJhbmNl IG9mIGVhY2gg bGV0dGVyIGFu ZCBhZGRzIHVu dXNlZCBsZXR0 ZXJzIHRvIHRo ZSBlbmQ7IDgu IFRoZSBCTFQg QWxnb3JpdGht IGJ5IEx1cmVu cyBwcm92aWRl cyByYXRoZXIg bG93IGxldmVs IHNlY3VyaXR5 IHlldCBpcyBz dXBlcmlvciB0 byBtYW55IGNv bW1vbiBwYXBl ciBhbmQgcGVu Y2lsIGFsZ29y aXRobXM7IDku IEJMVCBpcyBw cm92aWRlZCBm b3IgcmVjcmVh dGlvbmFsIHB1 cnBvc2VzIHdp dGggbm8gZXhw ZWN0YXRpb24g b2YgbGVnYWwg c2VjdXJpdHk7 ICAxMC4gQkxU IHN0YW5kcyBm b3IgdGhlIHVu dXN1YWwgQmFj b25pYW4gTGlr ZSBUcml0IENp cGhlciB3aGlj aCBpdCBpcywg YW5kIGFsc28g YnJpbmdzIHRv IG1pbmQgYSB0 YW50YWxpemlu ZyBsYXllcmVk IHNhbmR3aWNo LiIgOyBhbGVy dChhJCk7IH0K Ci8vRlVOQ1RJ T04gQ0xFQU4g Y2xlYXJzIGZp ZWxkcwpmdW5j dGlvbiBjbGVh bihmb3JtLCBu cil7aWYgKG5y ID09IDEpe2Zv cm0ucmF3LnZh bHVlID0gIiI7 IGZvcm0uaGFz a2V5LnZhbHVl ID0gIiI7IApm b3JtLnRlc3Rl ZC52YWx1ZSA9 ICJQbGVhc2Ug c2VsZWN0IGEg S0VZISI7Zm9y bS5jaGFuY2Uu dmFsdWUgPSAi c2VlIHRoZSBy YW5kb21pemVy Ijt9CmlmIChu ciA9PSAyKXtm b3JtLm1pZGRs ZS52YWx1ZSA9 ICIiO319Cgpm dW5jdGlvbiBt b3ZlaXQoZm9y bSl7Zm9ybS5t aWRkbGUudmFs dWUgPSBmb3Jt Lm1haW4udmFs dWU7fQoKLy8g LS0+IDkiIE8m KTYtKAo8L1ND UklQVD48L0hF QUQ+PEJPRFkg Ymdjb2xvcj0i I2RkYWE1NSI+ CjxGT1JNIG5h bWUgPSAibXlj cnlwdG8iPjxD RU5URVI+CjxJ TlBVVCB0eXBl ID0gImhpZGRl biIgbmFtZSA9 IGhhc2tleSB2 YWx1ZT0iIj4K PElOUFVUIHR5 cGUgPSAiaGlk ZGVuIiBuYW1l ID0gbm9ubyQg dmFsdWU9Inh0 aG9zZSI+Cjxj ZW50ZXI+PElO UFVUIG9uY2xp Y2s9InJlc2V0 KGZvcm0pIiB2 YWx1ZT0iUkVT RVQgUGFnZSIg dHlwZT0iYnV0 dG9uIj4KPElO UFVUIG9uY2xp Y2s9Imluc3Ry dWN0aW9ucyhm b3JtKSIgdmFs dWU9IkFib3V0 OiBCTFQsIEJh Y29uaWFuLUxp a2UgVHJpdCBD aXBoZXIgYnkg THVyZW5zLCBN YXJjaCA2LCAy MDEwIiB0eXBl PSJidXR0b24i Pjxicj4KPFRF WFRBUkVBIHN0 eWxlPSJiYWNr Z3JvdW5kLWNv bG9yOiB5ZWxs b3c7IGZvbnQt ZmFtaWx5OiBt b25vc3BhY2U7 IiBuYW1lPSJy YXciIGNvbHM9 Ijc0IiByb3dz PSIyIj5FbnRl ciBzb21lIHdv cmRzIEhFUkUg YW5kIFNlbGVj dCBNQUtFIEtF WSwgb3Igc2Vs ZWN0IENPTU1P TiBvciBERUZB VUxUIHRvIGVu YWJsZSBwcm9j ZXNzaW5nLjwv VEVYVEFSRUE+ PGJyPgo8SU5Q VVQgb25jbGlj az0icHJvY2Vz cyhmb3JtLCAx KSIgdmFsdWU9 ICJNQUtFIEtF WSBmcm9tIEFi b3ZlIiB0eXBl PSJidXR0b24i Pgo8SU5QVVQg b25jbGljaz0i cHJvY2Vzcyhm b3JtLCAyKSIg dmFsdWU9ICJB IENPTU1PTiBL RVkiIHR5cGU9 ImJ1dHRvbiI+ CjxJTlBVVCBv bmNsaWNrPSJw cm9jZXNzKGZv cm0sIDMpIiB2 YWx1ZT0gIkRF RkFVTFQgS0VZ IiB0eXBlPSJi dXR0b24iPgo8 SU5QVVQgb25j bGljaz0iY2xl YW4oZm9ybSwg MSkiIHZhbHVl PSAiQ0xFQVIg S2V5IEVudHJ5 IEZpZWxkIEFC T1ZFIiB0eXBl PSJidXR0b24i Pjxicj4KPFRF WFRBUkVBIHN0 eWxlPSJiYWNr Z3JvdW5kLWNv bG9yOiB5ZWxs b3c7IGZvbnQt ZmFtaWx5OiBt b25vc3BhY2U7 IiBuYW1lPSJ0 ZXN0ZWQiIGNv bHM9IjUzIiBy b3dzPSIyIj5Z b3UgaGF2ZSBu b3QgeWV0IHNl bGVjdGVkIGEg S0VZITwvVEVY VEFSRUE+IDxU RVhUQVJFQSBz dHlsZT0iYmFj a2dyb3VuZC1j b2xvcjogcmdi KDI1NSwgMTMw LCAyNTUpOyBm b250LWZhbWls eTogbW9ub3Nw YWNlOyIgbmFt ZT0iY2hhbmNl IiBjb2xzPSIx MyIgcm93cz0i MiI+cmFuZG9t aXplciBzZWVk IHNob3duPC9U RVhUQVJFQT48 dGV4dGFyZWEg cm93cz0iNiIg bmFtZT0ibWlk ZGxlIiBzdHls ZT0iYmFja2dy b3VuZC1jb2xv cjogcmdiKDIw MCwgMjU1LCAy MDApOyBjb2xv cjogIzAwMDBh YTsgZm9udC1m YW1pbHk6IENh bWJyaWEgOyBm b250LXNpemUg OiAyMCBwdDsg d2lkdGg6MTAw JTsgaGVpZ2h0 OjM0JTsiIG9u Zm9jdXM9Imlm ICh0aGlzLnZh bHVlPT0mcXVv dDsgaGVyZS4m cXVvdDspe3Ro aXMudmFsdWU9 JnF1b3Q7JnF1 b3Q7fSI+KFRo aXMgRmllbGQg aXMgZm9yIElu cHV0KTwvdGV4 dGFyZWE+CjxJ TlBVVCBvbmNs aWNrPSJjbGVh bihmb3JtLCAy KSIgdmFsdWU9 ICJDTEVBUiBJ bnB1dCBGaWVs ZCBBYm92ZSIg dHlwZT0iYnV0 dG9uIj4KPElO UFVUIG9uY2xp Y2s9ImVuY3J5 cHQoZm9ybSwg MCkiIHZhbHVl PSJFTkNSWVBU IiB0eXBlPSJi dXR0b24iPgo8 SU5QVVQgb25j bGljaz0iZW5j cnlwdChmb3Jt LCAxKSIgdmFs dWU9IihubyBQ dCBpbiBDdCki IHR5cGU9ImJ1 dHRvbiI+PElO UFVUIG9uY2xp Y2s9Im1vdmVp dChmb3JtKSIg dmFsdWU9Il5e IE1PVkUgXl4i IHR5cGU9ImJ1 dHRvbiI+CjxJ TlBVVCBvbmNs aWNrPSJkZWNy eXB0KGZvcm0p IiB2YWx1ZT0i REVDUllQVCIg dHlwZT0iYnV0 dG9uIj4KPElO UFVUIG9uY2xp Y2s9ImZvcm0u bWFpbi5mb2N1 cygpO2Zvcm0u bWFpbi5zZWxl Y3QoKTsiIHZh bHVlPSJTRUxF Q1QgT3V0cHV0 IEZpZWxkIEJl bG93IiB0eXBl PSJidXR0b24i Pgo8dGV4dGFy ZWEgcm93cz0i NiIgbmFtZT0i bWFpbiIgc3R5 bGU9ImJhY2tn cm91bmQtY29s b3I6IHJnYigy MTEsIDIxMSwg MjU1KTsgY29s b3I6ICNhYTAw MDA7Zm9udC1m YW1pbHk6IENh bWJyaWEgOyBm b250LXNpemUg OiAyMCBwdDsg d2lkdGg6MTAw JTsgaGVpZ2h0 OjM0JTsiIG9u Zm9jdXM9Imlm ICh0aGlzLnZh bHVlPT0mcXVv dDsgaGVyZS4m cXVvdDspe3Ro aXMudmFsdWU9 JnF1b3Q7JnF1 b3Q7fSI+KFRo aXMgQm90dG9t IEZpZWxkIGlz IGZvciBPdXRw dXQpPC90ZXh0 YXJlYT48L2Nl bnRlcj48L0JP RFk+PC9IVE1M Pg==
From: David Eather on 8 Mar 2010 18:23 On 4/03/2010 9:55 PM, WTShaw wrote: > On Mar 4, 3:51 am, WTShaw<lure...(a)gmail.com> wrote: >> On Feb 28, 7:57 am, bmearns<mearn...(a)gmail.com> wrote: >> >> >> >>> On Feb 26, 5:32 pm, WTShaw<lure...(a)gmail.com> wrote: >> >>>> On Feb 25, 11:38 am, bmearns<mearn...(a)gmail.com> wrote: >> >>>>> On Feb 25, 10:45 am, WTShaw<lure...(a)gmail.com> wrote: >> >>>>>> Now are you meaning an encrypted message which is also the source for >>>>>> the key? It seems that if they are not the same that solution could >>>>>> be less fun. >> >>>>> Are you asking what I attacked, or what I was jokingly suggested is >>>>> posted in Sundays papers? For the attack, I had an encrypted message >>>>> and a short crib for it. In other words, I had a matched pair of >>>>> cipher text and the plain-text that generated it, from which I was >>>>> able to deduce all three pools in their entirety, and was able to >>>>> populate 15 entries in the table. In practice, this sort of partial >>>>> solve would allow me to partially decrypt other messages for which I >>>>> did not have a crib, and then using intelligent guesses about >>>>> undeciphered characters, could create additional cribs to continue >>>>> filling in the table. >> >>>>> For instance, if I my partial solution allowed me to decode "q?een of >>>>> heart?", I could reasonably guess that the missing letters were u and >>>>> s; and I could then use the corresponding trigraphs to fill in those >>>>> two letters in the table. The point, of course, is that a partial >>>>> solve can be quite effective, and I was able to get a partial solve >>>>> using a relatively short crib. >> >>>>> -Brian >> >>>> You missed the difference between using BLT as a keyed cipher in which >>>> there is no crib to use as an autodictive cipher which you chose to >>>> solve. As an exercise, the later may be instructional, maybe. >> >>> Well as we've well established, and as I freely admit, you seem to >>> know a lot more about cryptography than I do, and at any rate I am >>> very much an amateur in the field. What I "chose" to solve was the >>> exactly problem that you posted: I attacked a plain-text/cipher-text >>> pair generated exactly the way you described it in the original post. >>> If there are stronger ways to use the cipher, it's probably worth your >>> mentioning that. >> >>> Perhaps it is simply my lack of experience and knowledge in the field, >>> but I can't imagine how a certain type of cipher could be crib-free. >>> Cribs---at least in the general meaning of the term that I'm using >>> here, which is simply a sample of known plain-text and the matching >>> cipher-text; if there is a more particular definition I'm unaware of, >>> I would certainly love to know it---are not a feature of the cipher, >>> they're the result of non-cryptographic activities carried out to >>> learn more information about the communications being attacked. >>> Certainly some ciphers are more resistant to a known-plain-text >>> attacker, but that doesn't mean the crib doesn't exist. >> >>> -Brian >> >> If I don't get back on the group here, it's because of time >> conflicts...but I do need to say more picking up at the tops posts. >> We'll see how much time I can devote to this as I have a busy schedule >> tomorrow. >> >> I've seen an error in my program that probably did not make too much >> difference. The javascript version was taken in function from old >> source circa 1995. Originally, I started with the straight generic >> key to make things work and simply eliminated allowing the slant sign, >> the last character in the key, to be accepted into ciphertext. >> >> I failed then to adjust the statements when I build a dynamic key >> process, so the result was that the 27th character of the key was >> nulled out. Now, that's fixed. I've also made a version that rejects >> use of the original plaintext character in any triad that represents >> it. >> >> That said, the distribution of ciphertext characters remain >> essentially a random distribution that can change just on the picking >> function with the pRCG alone. The advantage of the generator is that >> it is directly character driven rather than with pRNG driven where >> several additional steps are needed to get back to letters. >> >> The pseudo random results might look something like this from the >> previous dumb ciphertext: >> >> Total Characters = 690 from 'abcdefghijklmnopqrstuvwxyz' >> a 21 3.039073806078148% >> b 22 3.183791606367583% >> c 36 5.209840810419681% >> d 23 3.3285094066570187% >> e 24 3.4732272069464547% >> f 41 5.933429811866859% >> g 25 3.61794500723589% >> h 19 2.7496382054992763% >> i 37 5.354558610709118% >> j 21 3.039073806078148% >> k 15 2.170767004341534% >> l 36 5.209840810419681% >> m 27 3.907380607814761% >> n 18 2.6049204052098407% >> o 40 5.788712011577424% >> p 25 3.61794500723589% >> q 16 2.3154848046309695% >> r 36 5.209840810419681% >> s 27 3.907380607814761% >> t 15 2.170767004341534% >> u 32 4.630969609261939% >> v 31 4.486251808972503% >> w 28 4.052098408104197% >> x 31 4.486251808972503% >> y 23 3.3285094066570187% >> z 21 3.039073806078148% >> >> The idea is to eliminate cribs, no, nada, none. In the known example, >> you can work backwards but the unknown is another story. >> >> The idea of looking for a match between plaintext and ciphertext, or >> total omissions is important because like the enigma, missing letters >> were key, pardon the pun, to breaking it, and daily keys. >> >> Taking the above ciphertext and decrypting it, it's simple to see it >> to be: >> "it is rather simple to use the normal alphabet in standard form >> chased by a slant sign as the key for blt x a dumb blt decoder is >> rather limited but it does make its point as it easily hides >> information j at least from the dumb x " >> >> Using the key "the /qu ick bro wnf xjm psv laz ydg" to encrypt to >> shield plaintext letter us and running the frequencies, they are as >> follows: >> >> a 25 3.61794500723589% >> b 41 5.933429811866859% >> c 28 4.052098408104197% >> d 21 3.039073806078148% >> e 15 2.170767004341534% >> f 23 3.3285094066570187% >> g 18 2.6049204052098407% >> h 19 2.7496382054992763% >> i 42 6.078147612156296% >> j 16 2.3154848046309695% >> k 15 2.170767004341534% >> l 36 5.209840810419681% >> m 19 2.7496382054992763% >> n 27 3.907380607814761% >> o 13 1.881331403762663% >> p 36 5.209840810419681% >> q 27 3.907380607814761% >> r 27 3.907380607814761% >> s 26 3.762662807525326% >> t 37 5.354558610709118% >> u 15 2.170767004341534% >> v 19 2.7496382054992763% >> w 39 5.643994211287988% >> x 41 5.933429811866859% >> y 49 7.091172214182344% >> z 16 2.3154848046309695% >> >> and next pass: >> >> a 17 2.4566473988439306% >> b 39 5.635838150289017% >> c 25 3.6127167630057806% >> d 27 3.901734104046243% >> e 15 2.167630057803468% >> f 17 2.4566473988439306% >> g 18 2.601156069364162% >> h 28 4.046242774566474% >> i 39 5.635838150289017% >> j 23 3.3236994219653178% >> k 16 2.312138728323699% >> l 39 5.635838150289017% >> m 21 3.0346820809248554% >> n 26 3.7572254335260116% >> o 20 2.8901734104046244% >> p 44 6.358381502890173% >> q 19 2.745664739884393% >> r 21 3.0346820809248554% >> s 30 4.335260115606936% >> t 34 4.913294797687861% >> u 18 2.601156069364162% >> v 13 1.8786127167630058% >> w 36 5.202312138728324% >> x 44 6.358381502890173% >> y 47 6.791907514450866% >> z 15 2.167630057803468% >> >> and will be different each time it is run. >> >> Rock climbing methods would probably work to break any text but double >> encryption with a second key would present quite another problem and >> words would disappear as cribs. > > The postings of frequencies are fodder for analysis, something you > might not have in different forms. Different keys would produce > greater variances. With more work, a technique might begin to > develop, some sort of interference pattern of the trigraphs. Your cipher was analysed and it failed quite spectacularly. That you don't understand that is not a surprise given what else you've shown.
From: WTShaw on 9 Mar 2010 17:28 On Mar 8, 5:23 pm, David Eather <eat...(a)tpg.com.au> wrote: > On 4/03/2010 9:55 PM, WTShaw wrote: > > Your cipher was analysed and it failed quite spectacularly. That you > don't understand that is not a surprise given what else you've shown. Solve it...and, I'll give you a crib: yxarf ehzmv ypico segtd iqflr ubegx pykji zcman dskeu yogsa eubyq jlxor bygcf wmklh ipqby lorjv xfepk sbhxz ftske cnxgl wuirm esqyi nhdse kocyx qzhso balkq fwrsn tucqx mjfph yanvi dfxkb snlfa ycdux htlqr gzuvw dkoys qahnd biqma hyrsb oxlcn smwux kgace bjrlx tchsk yrpjv qgwat mnezg jhskb pgwyo qhluc bdnyv hzlqf xsbon qzpxs uvhje yirog xenav lkgsy bzmjh ewtio vynda mexyi hjsor cabxk svduq icpnx fyahk rtwqp svoal hrsgk bocyx ge Total Characters = 100 from 'abcdefghijklmnopqrstuvwxyz' a 5 4.9504950495049505% b 1 0.9900990099009901% c 4 3.9603960396039604% d 3 2.9702970297029703% e 10 9.900990099009901% f 3 2.9702970297029703% g 3 2.9702970297029703% h 5 4.9504950495049505% i 10 9.900990099009901% j 1 0.9900990099009901% k 1 0.9900990099009901% l 0 0% m 1 0.9900990099009901% n 8 7.920792079207921% o 8 7.920792079207921% p 2 1.9801980198019802% q 1 0.9900990099009901% r 10 9.900990099009901% s 6 5.9405940594059405% t 8 7.920792079207921% u 4 3.9603960396039604% v 0 0% w 2 1.9801980198019802% x 0 0% y 4 3.9603960396039604% z 0 0% If I am correct, this is more that the unicity threshold it might have. And, what is that? I call a 100 letter plaintext to recover a CNote. Can you hack it? There is an intentional weakness too but truth in what it says.
From: WTShaw on 9 Mar 2010 17:31 > > >> If you were trying to make a point about entropy or unicity then you > >> could at least finish your calculation and actually try to make your point. > > > The complaint was raised that I had no data to study...always did and > > see the same results here...not much help for a simple linear solution. > > No the complain was that you produced any mathematical results - and > you still haven't What was it about the constipated mathematician that worked it out with a pencil?
From: biject on 9 Mar 2010 18:07
On Mar 8, 4:23 pm, David Eather <eat...(a)tpg.com.au> wrote: > On 4/03/2010 9:55 PM, WTShaw wrote: > > > > > > > On Mar 4, 3:51 am, WTShaw<lure...(a)gmail.com> wrote: > >> On Feb 28, 7:57 am, bmearns<mearn...(a)gmail.com> wrote: > > >>> On Feb 26, 5:32 pm, WTShaw<lure...(a)gmail.com> wrote: > > >>>> On Feb 25, 11:38 am, bmearns<mearn...(a)gmail.com> wrote: > > >>>>> On Feb 25, 10:45 am, WTShaw<lure...(a)gmail.com> wrote: > > >>>>>> Now are you meaning an encrypted message which is also the source for > >>>>>> the key? It seems that if they are not the same that solution could > >>>>>> be less fun. > > >>>>> Are you asking what I attacked, or what I was jokingly suggested is > >>>>> posted in Sundays papers? For the attack, I had an encrypted message > >>>>> and a short crib for it. In other words, I had a matched pair of > >>>>> cipher text and the plain-text that generated it, from which I was > >>>>> able to deduce all three pools in their entirety, and was able to > >>>>> populate 15 entries in the table. In practice, this sort of partial > >>>>> solve would allow me to partially decrypt other messages for which I > >>>>> did not have a crib, and then using intelligent guesses about > >>>>> undeciphered characters, could create additional cribs to continue > >>>>> filling in the table. > > >>>>> For instance, if I my partial solution allowed me to decode "q?een of > >>>>> heart?", I could reasonably guess that the missing letters were u and > >>>>> s; and I could then use the corresponding trigraphs to fill in those > >>>>> two letters in the table. The point, of course, is that a partial > >>>>> solve can be quite effective, and I was able to get a partial solve > >>>>> using a relatively short crib. > > >>>>> -Brian > > >>>> You missed the difference between using BLT as a keyed cipher in which > >>>> there is no crib to use as an autodictive cipher which you chose to > >>>> solve. As an exercise, the later may be instructional, maybe. > > >>> Well as we've well established, and as I freely admit, you seem to > >>> know a lot more about cryptography than I do, and at any rate I am > >>> very much an amateur in the field. What I "chose" to solve was the > >>> exactly problem that you posted: I attacked a plain-text/cipher-text > >>> pair generated exactly the way you described it in the original post. > >>> If there are stronger ways to use the cipher, it's probably worth your > >>> mentioning that. > > >>> Perhaps it is simply my lack of experience and knowledge in the field, > >>> but I can't imagine how a certain type of cipher could be crib-free. > >>> Cribs---at least in the general meaning of the term that I'm using > >>> here, which is simply a sample of known plain-text and the matching > >>> cipher-text; if there is a more particular definition I'm unaware of, > >>> I would certainly love to know it---are not a feature of the cipher, > >>> they're the result of non-cryptographic activities carried out to > >>> learn more information about the communications being attacked. > >>> Certainly some ciphers are more resistant to a known-plain-text > >>> attacker, but that doesn't mean the crib doesn't exist. > > >>> -Brian > > >> If I don't get back on the group here, it's because of time > >> conflicts...but I do need to say more picking up at the tops posts. > >> We'll see how much time I can devote to this as I have a busy schedule > >> tomorrow. > > >> I've seen an error in my program that probably did not make too much > >> difference. The javascript version was taken in function from old > >> source circa 1995. Originally, I started with the straight generic > >> key to make things work and simply eliminated allowing the slant sign, > >> the last character in the key, to be accepted into ciphertext. > > >> I failed then to adjust the statements when I build a dynamic key > >> process, so the result was that the 27th character of the key was > >> nulled out. Now, that's fixed. I've also made a version that rejects > >> use of the original plaintext character in any triad that represents > >> it. > > >> That said, the distribution of ciphertext characters remain > >> essentially a random distribution that can change just on the picking > >> function with the pRCG alone. The advantage of the generator is that > >> it is directly character driven rather than with pRNG driven where > >> several additional steps are needed to get back to letters. > > >> The pseudo random results might look something like this from the > >> previous dumb ciphertext: > > >> Total Characters = 690 from 'abcdefghijklmnopqrstuvwxyz' > >> a 21 3.039073806078148% > >> b 22 3.183791606367583% > >> c 36 5.209840810419681% > >> d 23 3.3285094066570187% > >> e 24 3.4732272069464547% > >> f 41 5.933429811866859% > >> g 25 3.61794500723589% > >> h 19 2.7496382054992763% > >> i 37 5.354558610709118% > >> j 21 3.039073806078148% > >> k 15 2.170767004341534% > >> l 36 5.209840810419681% > >> m 27 3.907380607814761% > >> n 18 2.6049204052098407% > >> o 40 5.788712011577424% > >> p 25 3.61794500723589% > >> q 16 2.3154848046309695% > >> r 36 5.209840810419681% > >> s 27 3.907380607814761% > >> t 15 2.170767004341534% > >> u 32 4.630969609261939% > >> v 31 4.486251808972503% > >> w 28 4.052098408104197% > >> x 31 4.486251808972503% > >> y 23 3.3285094066570187% > >> z 21 3.039073806078148% > > >> The idea is to eliminate cribs, no, nada, none. In the known example, > >> you can work backwards but the unknown is another story. > > >> The idea of looking for a match between plaintext and ciphertext, or > >> total omissions is important because like the enigma, missing letters > >> were key, pardon the pun, to breaking it, and daily keys. > > >> Taking the above ciphertext and decrypting it, it's simple to see it > >> to be: > >> "it is rather simple to use the normal alphabet in standard form > >> chased by a slant sign as the key for blt x a dumb blt decoder is > >> rather limited but it does make its point as it easily hides > >> information j at least from the dumb x " > > >> Using the key "the /qu ick bro wnf xjm psv laz ydg" to encrypt to > >> shield plaintext letter us and running the frequencies, they are as > >> follows: > > >> a 25 3.61794500723589% > >> b 41 5.933429811866859% > >> c 28 4.052098408104197% > >> d 21 3.039073806078148% > >> e 15 2.170767004341534% > >> f 23 3.3285094066570187% > >> g 18 2.6049204052098407% > >> h 19 2.7496382054992763% > >> i 42 6.078147612156296% > >> j 16 2.3154848046309695% > >> k 15 2.170767004341534% > >> l 36 5.209840810419681% > >> m 19 2.7496382054992763% > >> n 27 3.907380607814761% > >> o 13 1.881331403762663% > >> p 36 5.209840810419681% > >> q 27 3.907380607814761% > >> r 27 3.907380607814761% > >> s 26 3.762662807525326% > >> t 37 5.354558610709118% > >> u 15 2.170767004341534% > >> v 19 2.7496382054992763% > >> w 39 5.643994211287988% > >> x 41 5.933429811866859% > >> y 49 7.091172214182344% > >> z 16 2.3154848046309695% > > >> and next pass: > > >> a 17 2.4566473988439306% > >> b 39 5.635838150289017% > >> c 25 3.6127167630057806% > >> d 27 3.901734104046243% > >> e 15 2.167630057803468% > >> f 17 2.4566473988439306% > >> g 18 2.601156069364162% > >> h 28 4.046242774566474% > >> i 39 5.635838150289017% > >> j 23 3.3236994219653178% > >> k 16 2.312138728323699% > >> l 39 5.635838150289017% > >> m 21 3.0346820809248554% > >> n 26 3.7572254335260116% > >> o 20 2.8901734104046244% > >> p 44 6.358381502890173% > >> q 19 2.745664739884393% > >> r 21 3.0346820809248554% > >> s 30 4.335260115606936% > >> t 34 4.913294797687861% > >> u 18 2.601156069364162% > >> v 13 1.8786127167630058% > >> w 36 5.202312138728324% > >> x 44 6.358381502890173% > >> y 47 6.791907514450866% > >> z 15 2.167630057803468% > > >> and will be different each time it is run. > > >> Rock climbing methods would probably work to break any text but double > >> encryption with a second key would present quite another problem and > >> words would disappear as cribs. > > > The postings of frequencies are fodder for analysis, something you > > might not have in different forms. Different keys would produce > > greater variances. With more work, a technique might begin to > > develop, some sort of interference pattern of the trigraphs. > > Your cipher was analysed and it failed quite spectacularly. That you > don't understand that is not a surprise given what else you've shown. Really do you have proof his cipher failed quite spectacularly I am sure many said bad things about it since he is his on man. But I would be surprised to find an actual break. David A. Scott -- My Crypto code http://bijective.dogma.net/crypto/scott19u.zip http://www.jim.com/jamesd/Kong/scott19u.zip old version My Compression code http://bijective.dogma.net/ **TO EMAIL ME drop the roman "five" ** Disclaimer:I am in no way responsible for any of the statements made in the above text. For all I know I might be drugged. As a famous person once said "any cryptograhic system is only as strong as its weakest link" |