Deutsch English Français Italiano |
<vk4lte$3khvi$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com> Newsgroups: sci.crypt Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex Date: Fri, 20 Dec 2024 13:00:30 -0800 Organization: A noiseless patient Spider Lines: 37 Message-ID: <vk4lte$3khvi$1@dont-email.me> References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me> <vk4lc4$5c04$1@paganini.bofh.team> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Fri, 20 Dec 2024 22:00:31 +0100 (CET) Injection-Info: dont-email.me; posting-host="90d0359d260b5ab20f7104a3aa6ad836"; logging-data="3819506"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/gst8t/ZQQHuEK1v41Vm6CSFjTbP74Ncg=" User-Agent: Mozilla Thunderbird Cancel-Lock: sha1:EuUbRhRQ16juWhFz9GbB4DR6caI= Content-Language: en-US In-Reply-To: <vk4lc4$5c04$1@paganini.bofh.team> Bytes: 2295 On 12/20/2024 12:51 PM, Stefan Claas wrote: > Chris M. Thomasson wrote: >> On 12/20/2024 12:35 PM, Stefan Claas wrote: >>> Hi all, >>> >>> I recently finished my Doppekastenschluessel-Hex project, >>> which is a simplified version of the original German WWII >>> cipher, with hex notation. >>> >>> For more details check my previous thread 'Seriation' >>> >>> Your task is to crack the provided message, which uses >>> only one key for encryption, instead of two (default) >>> or more. >>> >>> The message: >>> >>> 75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C >>> C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6 >>> >>> Please note: The message is written as normal text and >>> not like plaintext messages from the old days and with >>> padding applied. >> >> Perhaps we need a larger amount of ciphertext? > > That would make cryptanalysis easier, right? I think so. Depends on the algorithm. If it's secure than perhaps no so much... The interesting aspect of SCOS is that it's not secure at all. > > BTW. For drawing the winners, should they been drawn from > a random pool of entries, or by first come first serve? > That is up to you! :^)