Deutsch English Français Italiano |
<v8cdc3$1eb4h$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: an scos2 test... Date: Tue, 30 Jul 2024 21:08:34 -0700 Organization: A noiseless patient Spider Lines: 53 Message-ID: <v8cdc3$1eb4h$1@dont-email.me> References: <v7uiuf$2f66c$2@dont-email.me> <v7v6ll$2m54v$1@dont-email.me> <v7vbd9$2mqds$2@dont-email.me> <v7vqeq$2p8to$1@dont-email.me> <v8172o$3151b$2@dont-email.me> <87bk2j65yl.fsf@bsb.me.uk> <v82745$39hi0$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Injection-Date: Wed, 31 Jul 2024 06:08:35 +0200 (CEST) Injection-Info: dont-email.me; posting-host="74e95562e9d30488492612fbf917977f"; logging-data="1518737"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+mjo9dMkWy0QxN7NYI6F77zaraO6J9gV0=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:gxJtZGsQM/o6wDD9AGCAIjkt4w8= Content-Language: en-US In-Reply-To: <v82745$39hi0$1@dont-email.me> Bytes: 2933 On 7/27/2024 12:20 AM, Richard Harnden wrote: > On 27/07/2024 01:20, Ben Bacarisse wrote: >> "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> writes: >> >>> On 7/26/2024 2:32 AM, Richard Harnden wrote: >>>> On 26/07/2024 06:15, Chris M. Thomasson wrote: >>>>> On 7/25/2024 8:54 PM, Rich wrote: >>>>>> scos2 65 33 >>>>>> >>>>>> 0ZGS XB sJ@ lH ~i<8/ >>>>> >>>>> For some reason I am getting a plaintext of: >>>>> >>>>> ~U9o My 8/g v[ Ym9\; >>>>> >>>>> using my impl and Rich's original scos2 impl. >>>> The key is wrong, try: >>>> 28 60 >>>> 0ZGS XB sJ@ lH ~i<8/ >>> >>> Indeed it works like a charm. It had to be a "key issue". Humm... That >>> would be a fun test? Try different keys and log "readable" results wrt >>> decrypted plaintext? ;^) >> >> Yes. Somewhere I have a program that just tries all keys. I was going >> to get it to stop when English (or C) letter frequencies were found but >> it turned out simpler just to eyeball the output. As a human, you can >> spot a decrypt a mile off and, if I remember correctly, SCOS has "close >> decrypts" that I could spot but which would look, statistically, like >> plaintext. >> > > I have one that tries to find consistent incr's in 3-letter word-blocks. > Hopefully the correct base and incr bubble to the top. > > It's better with longer texts, but ... > > $ cat test.scos > 0ZGS XB sJ@ lH ~i<8/ > > $ ./decode_scos test.scos | ./scos > ./decode_scos: Not sure, but ... > > -28 -60 > > Yes, it can be read. > > > -71 -60 > > =~Bu :C ]}, [~ A~}#s > > The key space is not that massive, so it can be brute forced for sure. However, its interesting wrt the plaintext. What if the plaintext is generated from a random source?