| Deutsch English Français Italiano |
|
<vk4lc4$5c04$1@paganini.bofh.team> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!weretis.net!feeder8.news.weretis.net!newsfeed.bofh.team!paganini.bofh.team!not-for-mail From: Stefan Claas <pollux@tilde.club> Newsgroups: sci.crypt Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex Date: Fri, 20 Dec 2024 21:51:11 +0100 Organization: To protect and to server Message-ID: <vk4lc4$5c04$1@paganini.bofh.team> References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me> Mime-Version: 1.0 Injection-Date: Fri, 20 Dec 2024 20:51:16 -0000 (UTC) Injection-Info: paganini.bofh.team; logging-data="176132"; posting-host="exdgKTMkOpXBkIICIavttA.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A"; User-Agent: flnews/1.3.0pre28 (for GNU/Linux) Cancel-Lock: sha1:Sr6umGMcHa1gDSufo0y7X6B1na8= X-Notice: Filtered by postfilter v. 0.9.3 X-Date: It's Fri Sep 11434 09:51:12 PM CET 1993, the September that never ends. X-Ed25519-Sig: 845862a8078871a66f1489b79e1374070f9557f650012c7e588b8182ff717ca2 62dc994c2a54d69af05a6c955ed34320300b71bf12276c2fba23346f8e84850a X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a Bytes: 2196 Lines: 32 Chris M. Thomasson wrote: > On 12/20/2024 12:35 PM, Stefan Claas wrote: > > Hi all, > > > > I recently finished my Doppekastenschluessel-Hex project, > > which is a simplified version of the original German WWII > > cipher, with hex notation. > > > > For more details check my previous thread 'Seriation' > > > > Your task is to crack the provided message, which uses > > only one key for encryption, instead of two (default) > > or more. > > > > The message: > > > > 75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C > > C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6 > > > > Please note: The message is written as normal text and > > not like plaintext messages from the old days and with > > padding applied. > > Perhaps we need a larger amount of ciphertext? That would make cryptanalysis easier, right? BTW. For drawing the winners, should they been drawn from a random pool of entries, or by first come first serve? -- Regards Stefan