Deutsch English Français Italiano |
<87bk2j65yl.fsf@bsb.me.uk> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!3.eu.feeder.erje.net!feeder.erje.net!news2.arglkargh.de!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Ben Bacarisse <ben@bsb.me.uk> Newsgroups: sci.crypt Subject: Re: an scos2 test... Date: Sat, 27 Jul 2024 01:20:34 +0100 Organization: A noiseless patient Spider Lines: 31 Message-ID: <87bk2j65yl.fsf@bsb.me.uk> References: <v7uiuf$2f66c$2@dont-email.me> <v7v6ll$2m54v$1@dont-email.me> <v7vbd9$2mqds$2@dont-email.me> <v7vqeq$2p8to$1@dont-email.me> <v8172o$3151b$2@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain Injection-Date: Sat, 27 Jul 2024 02:20:34 +0200 (CEST) Injection-Info: dont-email.me; posting-host="8660c91ae8e1739cda32c74c0645b237"; logging-data="3223452"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/DMDhb5hZkJB90rvzwLN7pQumyTUryM6A=" User-Agent: Gnus/5.13 (Gnus v5.13) Cancel-Lock: sha1:zCpRS3U3+WzWatKV2rJ7tFZLWAk= sha1:rZPcMD3LxBgBge60Mg9aWJC4V84= X-BSB-Auth: 1.a6fc1200598fbbff337f.20240727012034BST.87bk2j65yl.fsf@bsb.me.uk Bytes: 2168 "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> writes: > On 7/26/2024 2:32 AM, Richard Harnden wrote: >> On 26/07/2024 06:15, Chris M. Thomasson wrote: >>> On 7/25/2024 8:54 PM, Rich wrote: >>>> scos2 65 33 >>>> >>>> 0ZGS XB sJ@ lH ~i<8/ >>> >>> For some reason I am getting a plaintext of: >>> >>> ~U9o My 8/g v[ Ym9\; >>> >>> using my impl and Rich's original scos2 impl. >> The key is wrong, try: >> 28 60 >> 0ZGS XB sJ@ lH ~i<8/ > > Indeed it works like a charm. It had to be a "key issue". Humm... That > would be a fun test? Try different keys and log "readable" results wrt > decrypted plaintext? ;^) Yes. Somewhere I have a program that just tries all keys. I was going to get it to stop when English (or C) letter frequencies were found but it turned out simpler just to eyeball the output. As a human, you can spot a decrypt a mile off and, if I remember correctly, SCOS has "close decrypts" that I could spot but which would look, statistically, like plaintext. -- Ben.