Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <vk4lte$3khvi$1@dont-email.me>
Deutsch   English   Français   Italiano  
<vk4lte$3khvi$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Chris M. Thomasson" <chris.m.thomasson.1@gmail.com>
Newsgroups: sci.crypt
Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 13:00:30 -0800
Organization: A noiseless patient Spider
Lines: 37
Message-ID: <vk4lte$3khvi$1@dont-email.me>
References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me>
 <vk4lc4$5c04$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 20 Dec 2024 22:00:31 +0100 (CET)
Injection-Info: dont-email.me; posting-host="90d0359d260b5ab20f7104a3aa6ad836";
	logging-data="3819506"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/gst8t/ZQQHuEK1v41Vm6CSFjTbP74Ncg="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:EuUbRhRQ16juWhFz9GbB4DR6caI=
Content-Language: en-US
In-Reply-To: <vk4lc4$5c04$1@paganini.bofh.team>
Bytes: 2295

On 12/20/2024 12:51 PM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>> On 12/20/2024 12:35 PM, Stefan Claas wrote:
>>> Hi all,
>>>
>>> I recently finished my Doppekastenschluessel-Hex project,
>>> which is a simplified version of the original German WWII
>>> cipher, with hex notation.
>>>
>>> For more details check my previous thread 'Seriation'
>>>
>>> Your task is to crack the provided message, which uses
>>> only one key for encryption, instead of two (default)
>>> or more.
>>>
>>> The message:
>>>
>>> 75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C
>>> C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6
>>>
>>> Please note: The message is written as normal text and
>>> not like plaintext messages from the old days and with
>>> padding applied.
>>
>> Perhaps we need a larger amount of ciphertext?
> 
> That would make cryptanalysis easier, right?

I think so. Depends on the algorithm. If it's secure than perhaps no so 
much... The interesting aspect of SCOS is that it's not secure at all.

> 
> BTW. For drawing the winners, should they been drawn from
> a random pool of entries, or by first come first serve?
> 

That is up to you! :^)