1997-01-09 - Re: encryption program

Header Data

From: The Deviant <deviant@pooh-corner.com>
To: “Igor Chudov @ home” <ichudov@algebra.com>
Message Hash: c39d754fc31fbe1ff882e824db9fc7025bcc6c3f269d352275b08e8bd025f1d9
Message ID: <Pine.LNX.3.95.970109050923.2428A-100000@random.sp.org>
Reply To: <199701090132.TAA28002@manifold.algebra.com>
UTC Datetime: 1997-01-09 05:16:49 UTC
Raw Date: Wed, 8 Jan 1997 21:16:49 -0800 (PST)

Raw message

From: The Deviant <deviant@pooh-corner.com>
Date: Wed, 8 Jan 1997 21:16:49 -0800 (PST)
To: "Igor Chudov @ home" <ichudov@algebra.com>
Subject: Re: encryption program
In-Reply-To: <199701090132.TAA28002@manifold.algebra.com>
Message-ID: <Pine.LNX.3.95.970109050923.2428A-100000@random.sp.org>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 8 Jan 1997, Igor Chudov @ home wrote:

> Pierre -- 
> 
> Thanks for inventing an interesting encryption method. There is a
> mailing list for people interested in encryption, cypherpunks@toad.com,
> and they may be interested in trying to "break" your program. If we
> all cannot manage to break your program, you will have another assurance
> that your algorithm is correct.
> 
> Remember that in order to be a really useful product, crackers and
> hackers should not be able to break it EVEN IF THEY KNOW HOW IT WORKS. 
> 
> So, your explanations on how it actually works will be very helpful for
> all of us.
> 
> Cypherpunks, why don't we try to crack his encryption program? It seems
> like a fun exercise.
> 
> Below is his "encrypted" file from the link above. Let's see if anyone
> comes up with an idea to crack it!
> 
> 	- Igor.
> 
> ##> To help you:
> ##> - Only letters a..z and A..Z is encrypted.
> ##> - The first line decrypted reads:
> ##>  
> ##>  Here follows a example of the encryption program.  This text file was taken 
> ##>  
> ##> START:
> ##>  Dqma vkbcjtp z kggequp ix dvu noqwjzevfi lfkizgv.  Iquy aiay ifom gib knmdk 
> ##>  uwwt fhw wshg toaqyt cics.

Well, call it a hunch, but i'd say the first line of cyphertext is "Here
follows a example of the encryption program.  This text file was taken"

Why do i get the feeling whoever did this wasn't very bright?

It is, however, important to note that this isn't just simple
substitution, as shown in the word 'Here', where the cyphertext version is
not 3 characters with 1 repeating.

> ##>  
> ##>  Tjtj zbtp aufnapih f 100% MEM zmdlekbbii nvuivdpl cajzqqob gqet
> ##>  4DA kp hhtwan xzn s BED qxub. Jydi vfnpxtu zm GDL gpru kn rf faids
> ##>  vfhjdru 3.0 wa ynmbp.
> ##> 
> ##>  Zvu jxmx jpok wc nro xuevs PBM txu EPU gsfrc MXISCSX!
> ##> 
> ##>  Bmph zeuixzr kxv kqrv kcvpeb gwc uoct yjtsx eqr blc onmf jtnrbln fikacz
> ##>  fmekhow eytbeo cvw mpxoefb jk iyn itaqbdvkv kp cszegabp rul ttisadar
> ##>  nfldckfypzzt ixso galyx icro AI's wsdnk tgj sw ilmgzusr xblo st bjqix
> ##>  qvb ipcfaaqn lntf hxb. Pwic cg j ppac dl git rpxz jrrvyv grrbigqa eooi
> ##>  fsv nlpav.
> ##> 
> ##>  Ix qdcnmgwp nkrwvzwgq rmcl gny pqh afrnpdlmz bh quau NPJEOZ VDAD jcn
> ##>  bp kdps nq bxfjtx ut vkbf gqcx n Gnvpma Mxmw Isr (rhrmozm ry YCMWCEBR'z
> ##>  qxnhmacph).
> ##> 
> ##>  Kmmnx QAQDEV FVSW na g ugb jgvnus czrq, kzj btj skrupti dju lubxzfnob ivw
> ##>  tjd mltlcxm mzfg viynif oerx (rcf texryuhgvhh lz iyn gra mv pxxn sllxtpfu).
> ##> 
> ##> 
> ##>  VPGJBN JNHZYQG AGFAHQHX
> ##>  -----------------------
> ##> 
> ##>   Y. Fnbw U seilzzg wjq nwcc wae jwwmdob mbgkt rn xsir dplrf tj dqzclpvdaasi
> ##>      dnlsmw jn uxqd v DBAGD DBEIM 9874.
> ##>   V. Iyet bwxncnd mdeqmzpb 4XK bg pintxz wt aev.
> ##> 
> ##>      Yb bkr wsdx fhnm gclpwg, cap qoztki hdhrcp bbba ffsrk mm cjsm FFEXCA.TDZ
> ##>      kalm gytd gutndaq dpnk hdzkwg fnbw git kprvtwma ccerw.
> ##> 
> ##>      Pbg qpypmjf EJMDLJ.WKN prbthucy hxzb tbcmsfs iyn bsfijsyey hdokz:
> ##> 
> ##>       KALMF=20
> ##>       ZPKQUST=20
> ##> 
> ##>      Z ixyh ZFIYVZ.XGA crxg ckqm wam wjq nwcc qjt QMUSAXH dsi ei:
> ##> 
> ##>       bnztza=orhco.ipo
> ##>       zodpxw=agj386.imu tnqgq
> ##>       ckj=vbzb,vpm
> ##>       nnclpln= 30
> ##>       kwcnt= 20
> ##> 
> ##>      Stgrgwi, oavo JWVLSN.FEZ chqr jbzbr cxc gujg yw cgn heisgs. Cn
> ##>      vozmwxlmi kjdqk bnu 2 azha KDEIFF.NWN zs rjq bzyo g llyj gttvzon.
> ##> 
> ##> 
> ##>      QDUV LDLM HCASS SXXZHZTX XMEKKW LYA ESVCPNSUUY.
> ##> 
> ##> 
> ##>  ENFB NSPUY AAMHQYA, AFSCRKZ PAENMAC UG ZY RKJU
> ##>  ----------------------------------------------
> ##> 
> ##>  L.  Sxyi C pubyb mhm qshw wl "hpqob" iniym puy qkabanp "GP YPZTV NJPZ
> ##>      OTTFGQGK".
> ##>  V.  Eoih zm ozqlqrwfw i pkrimcnk fefewlm cubtrfno. Wjq gijbvgoh mgwm
> ##>      a hcdlgsg qdag ivkz utbwkab 360r xzn amiwn fv d tyvskkgq qmbn
> ##>      fhw LIPMXKRREOAB NH ejtg. Ahfvmu ixb llujnrw jz tkli idqyryr xobs.
> ##> 
> ##>  K.  Smre E sgs cos sphd vp "pwssh" ec.
> ##>  R.  Ami rurw pxwufm hurmha zm utzm tqi :-
> ##> 
> ##> END.
> ##> 
> ##> ** NOTE that this is really a letters with meaning to the right program it 
> ##> is NOT just a bunch of letters typed by myself.
> 
> > If you think this program can be used please reply to this letter and I 
> > will give you more information.
> > 
> > **PLEASE reply via e-mail ---> <a 
> > href="mailto:jvrooyen@liasec.infolink.co.za">CLICK HERE</a> to reply now.
> > 
> > Hope to hear from you soon.
> > 
> > Regards
> > Pierre van Rooyen
> > 
> 
> 
> 
> 	- Igor.
> 
> 

 --Deviant
   PGP KeyID = E820F015 Fingerprint = 3D6AAB628E3DFAA9 F7D35736ABC56D39

A Linux machine!  Because a 486 is a terrible thing to waste!
		-- Joe Sloan (jjs@wintermute.ucr.edu)


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBMtR+yTCdEh3oIPAVAQEyHQf9EyGDQj5fDhJmEeGSc6iEgoX6MX88ugCu
zT0bwXzji79VLqgjEUcjvf/7A09dwgqdO2moCewmm1rnvgHq6eD/LwEIlx4t04fi
6+Qaz5T4GhkEvO81kJ3j0S2J5w9MirwmWeaoWeNu0nBkpH4iyw8FjF1rF9jwRw6A
pY6+wrEVxfRINgBlgko5Yr9gQGOuUIP4GaQQ/FJx2J86z9fwDIYcUfOT0Qt2ru2c
aZniCP6/YW83YKQftES/Z7chnYhknrxMeuN9aO6F7LbXu1j+4qR28AAvgl/dJQHn
oO4ZfTpDjKIbS2toLBnmtFyLJShpimDd6ocN3Re4Vmzr31eN3bR72Q==
=Ktmj
-----END PGP SIGNATURE-----






Thread