Deutsch   English   Français   Italiano  
<v8cdc3$1eb4h$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: an scos2 test...
Date: Tue, 30 Jul 2024 21:08:34 -0700
Organization: A noiseless patient Spider
Lines: 53
Message-ID: <v8cdc3$1eb4h$1@dont-email.me>
References: <v7uiuf$2f66c$2@dont-email.me> <v7v6ll$2m54v$1@dont-email.me>
 <v7vbd9$2mqds$2@dont-email.me> <v7vqeq$2p8to$1@dont-email.me>
 <v8172o$3151b$2@dont-email.me> <87bk2j65yl.fsf@bsb.me.uk>
 <v82745$39hi0$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 31 Jul 2024 06:08:35 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="74e95562e9d30488492612fbf917977f";
	logging-data="1518737"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+mjo9dMkWy0QxN7NYI6F77zaraO6J9gV0="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:gxJtZGsQM/o6wDD9AGCAIjkt4w8=
Content-Language: en-US
In-Reply-To: <v82745$39hi0$1@dont-email.me>
Bytes: 2933

On 7/27/2024 12:20 AM, Richard Harnden wrote:
> On 27/07/2024 01:20, Ben Bacarisse wrote:
>> "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> writes:
>>
>>> On 7/26/2024 2:32 AM, Richard Harnden wrote:
>>>> On 26/07/2024 06:15, Chris M. Thomasson wrote:
>>>>> On 7/25/2024 8:54 PM, Rich wrote:
>>>>>> scos2 65 33
>>>>>>
>>>>>> 0ZGS XB sJ@ lH ~i<8/
>>>>>
>>>>> For some reason I am getting a plaintext of:
>>>>>
>>>>> ~U9o My 8/g v[ Ym9\;
>>>>>
>>>>> using my impl and Rich's original scos2 impl.
>>>> The key is wrong, try:
>>>> 28 60
>>>> 0ZGS XB sJ@ lH ~i<8/
>>>
>>> Indeed it works like a charm. It had to be a "key issue". Humm... That
>>> would be a fun test? Try different keys and log "readable" results wrt
>>> decrypted plaintext? ;^)
>>
>> Yes.  Somewhere I have a program that just tries all keys.  I was going
>> to get it to stop when English (or C) letter frequencies were found but
>> it turned out simpler just to eyeball the output.  As a human, you can
>> spot a decrypt a mile off and, if I remember correctly, SCOS has "close
>> decrypts" that I could spot but which would look, statistically, like
>> plaintext.
>>
> 
> I have one that tries to find consistent incr's in 3-letter word-blocks. 
>   Hopefully the correct base and incr bubble to the top.
> 
> It's better with longer texts, but ...
> 
> $ cat test.scos
> 0ZGS XB sJ@ lH ~i<8/
> 
> $ ./decode_scos test.scos | ./scos
> ./decode_scos: Not sure, but ...
>  > -28 -60
>  > Yes, it can be read.
> 
>  > -71 -60
>  > =~Bu :C ]}, [~ A~}#s
> 
> 

The key space is not that massive, so it can be brute forced for sure. 
However, its interesting wrt the plaintext. What if the plaintext is 
generated from a random source?