PDA

View Full Version : Break my cipher!



Ivius
2008-11-14, 06:57 PM
Inspired by the recent cryptanalytical challenges, I wanted to test how secure a cipher I recently implemented was. Will anybody take a crack at it? It's not a one time pad, and any whitespace is from the forum.


vjrehcodktxtsbgkxvpgdvhoivjodapmxjrjttnvbsktxwmnnl lpludsymwqfdkghjhudpdlgndiulqbxiyhrgjmqxrkvwwnffpa fnolxohoocjuixjddheqclwrmcjcvnbauiyaieegxnkdgmkcuv dertxrpspvamyfqpvsloccmniomchhcloskbmqyhncuhrxkkod wnnkaqeoooubwywhialfgjrafgvhegtddddjmihvjglweglylm vuntdavseywuibyeqecouskryinesjbphmprivxevluqmkkagt eiihciwuwqopeeromelpvnshvqvjtqlyufadfqvtanqmyssthn kcpxjixnlioktajaowyejklrpfekdqrpllcylkwnitbnyvanyq wjkljcbujedbrylkwivpmbckcdyfgspgnkwvrmsevhekkqhsvs pheofslmewugyhjqwbcnmxsewoyejcpqfvfmgbwqoeffuefgum sbauqngldgqhuuvuwqiayynmruakttjjvmvsvfjqublslqfwta dksuvrcsnkfjsoruoasrptlagasincchytmolgrailutcflssj kcgbypsbybakscyinpkloxaoyhkkxsnentargrjfwgjdgjtrvb ngqyjnlbwqowgscwrtajqtwtdvpkihaxvwuxohtfcnbfguvswd ualnkbdfsdfydbgeiarsaptdtyvpddnnqyrubryjilnextcyym kmjyfcmiihciawajcujykbaoyojhinkccgaveptijrvlpgdbwt uoqahypfqgmtklkakvgmeyivwvsyjrcmidolekvvqocotlqskc wylauhpvejikjwofiimtgutsrotungujrpgrdymqghyvkxiney ifaevdcruskqqmnghfxjotifryllvrqvxajoakfnmywmmbvquq bnlueewbdixrcktdgylunbikambhxrrfjrsfiyionrjhvaybfo xhmsltkfcxjtinjnmrutsvmqphwanswacqeyyyklmdgkxtiiaq gfdfqbfvcuuduawicssmgtsowjfhndbqagcxtdxwqccyguxcdv sjlgifqijricojaipuxbcpwwhdbyvcgiqjdbohxqdklfdvvius ljuxrunqnpycbjjomnauuthnyfqsmcddgxyudxopgleknqbwlq mxfwuwnvlnxudsebijlwwyimyuwdybfnygqreosnjmwledkpjm krlksmlskcikgkrhiojetkpmdunmykpvjeqmegycmkuvmavxfs dtsfvnvbtadnhiobubletwtrhqiyiplqhccjkbvvtjrcnksfav vmicmabuvnughampvtucfldhgwrtmravagarrnpdcpjpxvoqig kercoqhlfhwyegyutgqbgescbihkxwgihmdmgdfykuaeqbldpi poytmspkssaftvqnhcuokrbpqdhqadynmgiaagohsagegghiwd tfpkllogbtuvcoxprlaaenmwqitgweekdwovodqadibgnmjsrr guwmgbvmmrnqfldtrxcnaksccmmxstpadgkvofuxbrjgxobkwf himrgenarremleolbskrhisrdjqoklfycjsybddfcrvkvvambp maijjxmngjyqjiokhpyfmgkshoqejavnxxfcvgcjk

Tirian
2008-11-14, 07:28 PM
Given that the recent challenges you refer to turned out to be someone printing essentially random characters and then justifying that there was an algorithm to generating a plaintext message, you might not get too many volunteers. For all we know, this could be an eight-dimensional Hill cipher that you generated from a computer program.

Anyway, the standard for secure systems is allowing your adversary to know the algorithm behind the system. To give an example, the U.S. Army used double transposition in the field fifty years ago, which is hard to crack even when you know that the message is encrypted with double transposition. So tell us what you did to the plaintext and then it'll be easier to judge whether it is worthwhile to try to uncover the message.

Collin152
2008-11-14, 07:31 PM
Given that the recent challenges you refer to turned out to be someone printing essentially random characters and then justifying that there was an algorithm to generating a plaintext message, you might not get too many volunteers. For all we know, this could be an eight-dimensional Hill cipher that you generated from a computer program.

Anyway, the standard for secure systems is allowing your adversary to know the algorithm behind the system. To give an example, the U.S. Army used double transposition in the field fifty years ago, which is hard to crack even when you know that the message is encrypted with double transposition. So tell us what you did to the plaintext and then it'll be easier to judge whether it is worthwhile to try to uncover the message.

Hey! My cipher was no such thing!

Voshkod
2008-11-14, 07:33 PM
The letter Z is not used. The digraph "jr" is repeated nine times. There are over 26 digraphs repeated, indicating that it's not a simple substitution cypher featuring digraphs for letters. There are no trigraphs or higher.

Frequency analysis is not enlightening.

Ivius
2008-11-14, 07:41 PM
Given that the recent challenges you refer to turned out to be someone printing essentially random characters and then justifying that there was an algorithm to generating a plaintext message, you might not get too many volunteers. For all we know, this could be an eight-dimensional Hill cipher that you generated from a computer program.

Nope, it's a random arbitrary passage of text from wikipedia.

EDIT: I'm going to see if it's possible to break it without knowing the algorithm before giving it.