Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

You feel a whole lot more like you do now than you did when you used to.


sci / sci.crypt / Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex

SubjectAuthor
* [Christmas Challenge 2024] Crack Doppelkastenschluessel-HexStefan Claas
`* Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-HexChris M. Thomasson
 `* Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-HexStefan Claas
  `* Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-HexChris M. Thomasson
   `* Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-HexStefan Claas
    `* Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-HexChris M. Thomasson
     `- Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-HexStefan Claas

1
Subject: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Fri, 20 Dec 2024 20:35 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 21:35:47 +0100
Organization: To protect and to server
Message-ID: <vk4kfn$5as3$1@paganini.bofh.team>
Mime-Version: 1.0
Injection-Date: Fri, 20 Dec 2024 20:36:07 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="174979"; posting-host="exdgKTMkOpXBkIICIavttA.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre28 (for GNU/Linux)
Cancel-Lock: sha1:NSHtwysoBk6Na4M7A53x50xcqCg=
X-Date: It's Fri Sep 11434 09:35:47 PM CET 1993, the September that never ends.
X-Ed25519-Sig: dc476da941cdfaa11a75df803193194c33233c2ed87920f592c7a3e90351c583
1dc2c17e6aafc17543f68839594fac0ace3282bdae9cc73bb9c1e1920fa34506
X-Notice: Filtered by postfilter v. 0.9.3
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
View all headers

Hi all,

I recently finished my Doppekastenschluessel-Hex project,
which is a simplified version of the original German WWII
cipher, with hex notation.

For more details check my previous thread 'Seriation'

Your task is to crack the provided message, which uses
only one key for encryption, instead of two (default)
or more.

The message:

75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C
C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6

Please note: The message is written as normal text and
not like plaintext messages from the old days and with
padding applied.

The price for the Winner is a set of EFF lapel pins and
an orginal sticker for the 'age' encryption file program
and for the Runner-Up an 'age' file encryption sticker.

<https://1drv.ms/i/s!AjK3D2S6tPVNgSvTOonKu70ci9aX?e=KMZCdb>

Send your decrypted result to sacenator<at>gmail<dot>com
and do not post your result here.

Merry Christmas
Stefan

Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 20 Dec 2024 20:43 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 12:43:56 -0800
Organization: A noiseless patient Spider
Lines: 40
Message-ID: <vk4kuc$3k2q0$2@dont-email.me>
References: <vk4kfn$5as3$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 20 Dec 2024 21:43:56 +0100 (CET)
Injection-Info: dont-email.me; posting-host="90d0359d260b5ab20f7104a3aa6ad836";
logging-data="3803968"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19/lLqP2BqdnZeccWwFAzWsz/Vh6Rl2tJo="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:DFL+gl3R8qOWJ87e+nSlx1VFxs4=
In-Reply-To: <vk4kfn$5as3$1@paganini.bofh.team>
Content-Language: en-US
View all headers

On 12/20/2024 12:35 PM, Stefan Claas wrote:
> Hi all,
>
> I recently finished my Doppekastenschluessel-Hex project,
> which is a simplified version of the original German WWII
> cipher, with hex notation.
>
> For more details check my previous thread 'Seriation'
>
> Your task is to crack the provided message, which uses
> only one key for encryption, instead of two (default)
> or more.
>
> The message:
>
> 75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C
> C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6
>
> Please note: The message is written as normal text and
> not like plaintext messages from the old days and with
> padding applied.

Perhaps we need a larger amount of ciphertext?

Anyway, Merry Christmas!

>
> The price for the Winner is a set of EFF lapel pins and
> an orginal sticker for the 'age' encryption file program
> and for the Runner-Up an 'age' file encryption sticker.
>
> <https://1drv.ms/i/s!AjK3D2S6tPVNgSvTOonKu70ci9aX?e=KMZCdb>
>
> Send your decrypted result to sacenator<at>gmail<dot>com
> and do not post your result here.
>
> Merry Christmas
> Stefan

Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Fri, 20 Dec 2024 20:51 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 21:51:11 +0100
Organization: To protect and to server
Message-ID: <vk4lc4$5c04$1@paganini.bofh.team>
References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me>
Mime-Version: 1.0
Injection-Date: Fri, 20 Dec 2024 20:51:16 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="176132"; posting-host="exdgKTMkOpXBkIICIavttA.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre28 (for GNU/Linux)
Cancel-Lock: sha1:Sr6umGMcHa1gDSufo0y7X6B1na8=
X-Notice: Filtered by postfilter v. 0.9.3
X-Date: It's Fri Sep 11434 09:51:12 PM CET 1993, the September that never ends.
X-Ed25519-Sig: 845862a8078871a66f1489b79e1374070f9557f650012c7e588b8182ff717ca2
62dc994c2a54d69af05a6c955ed34320300b71bf12276c2fba23346f8e84850a
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
View all headers

Chris M. Thomasson wrote:
> On 12/20/2024 12:35 PM, Stefan Claas wrote:
> > Hi all,
> >
> > I recently finished my Doppekastenschluessel-Hex project,
> > which is a simplified version of the original German WWII
> > cipher, with hex notation.
> >
> > For more details check my previous thread 'Seriation'
> >
> > Your task is to crack the provided message, which uses
> > only one key for encryption, instead of two (default)
> > or more.
> >
> > The message:
> >
> > 75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C
> > C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6
> >
> > Please note: The message is written as normal text and
> > not like plaintext messages from the old days and with
> > padding applied.
>
> Perhaps we need a larger amount of ciphertext?

That would make cryptanalysis easier, right?

BTW. For drawing the winners, should they been drawn from
a random pool of entries, or by first come first serve?

--
Regards
Stefan

Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 20 Dec 2024 21:00 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 13:00:30 -0800
Organization: A noiseless patient Spider
Lines: 37
Message-ID: <vk4lte$3khvi$1@dont-email.me>
References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me>
<vk4lc4$5c04$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 20 Dec 2024 22:00:31 +0100 (CET)
Injection-Info: dont-email.me; posting-host="90d0359d260b5ab20f7104a3aa6ad836";
logging-data="3819506"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/gst8t/ZQQHuEK1v41Vm6CSFjTbP74Ncg="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:EuUbRhRQ16juWhFz9GbB4DR6caI=
Content-Language: en-US
In-Reply-To: <vk4lc4$5c04$1@paganini.bofh.team>
View all headers

On 12/20/2024 12:51 PM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>> On 12/20/2024 12:35 PM, Stefan Claas wrote:
>>> Hi all,
>>>
>>> I recently finished my Doppekastenschluessel-Hex project,
>>> which is a simplified version of the original German WWII
>>> cipher, with hex notation.
>>>
>>> For more details check my previous thread 'Seriation'
>>>
>>> Your task is to crack the provided message, which uses
>>> only one key for encryption, instead of two (default)
>>> or more.
>>>
>>> The message:
>>>
>>> 75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C
>>> C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6
>>>
>>> Please note: The message is written as normal text and
>>> not like plaintext messages from the old days and with
>>> padding applied.
>>
>> Perhaps we need a larger amount of ciphertext?
>
> That would make cryptanalysis easier, right?

I think so. Depends on the algorithm. If it's secure than perhaps no so
much... The interesting aspect of SCOS is that it's not secure at all.

>
> BTW. For drawing the winners, should they been drawn from
> a random pool of entries, or by first come first serve?
>

That is up to you! :^)

Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Fri, 20 Dec 2024 21:10 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 22:10:44 +0100
Organization: To protect and to server
Message-ID: <vk4mh8$5edv$1@paganini.bofh.team>
References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me> <vk4lc4$5c04$1@paganini.bofh.team> <vk4lte$3khvi$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Fri, 20 Dec 2024 21:11:04 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="178623"; posting-host="exdgKTMkOpXBkIICIavttA.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre28 (for GNU/Linux)
Cancel-Lock: sha1:rgDzcOg6DU8Ai7nZe/4bhEwydGs=
X-Ed25519-Sig: 9f6527ac47d81640f79617515cbcc9e641242386db9c6030f8c558c5e9ef3ea5
fcafa734ec9c51d4543cbe6192c7ce44aa6009ef05ae7a84eeb18735300d4c0a
X-Date: It's Fri Sep 11434 10:10:44 PM CET 1993, the September that never ends.
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Notice: Filtered by postfilter v. 0.9.3
View all headers

Chris M. Thomasson wrote:
> On 12/20/2024 12:51 PM, Stefan Claas wrote:

> > > Perhaps we need a larger amount of ciphertext?
> >
> > That would make cryptanalysis easier, right?
>
> I think so. Depends on the algorithm. If it's secure than perhaps no so
> much... The interesting aspect of SCOS is that it's not secure at all.

Well, only one key is used and it is a double square cipher, i.e. it is
basically a monoalphabetic bigraphic bipartite substitution, according
to Wikipedia.

> > BTW. For drawing the winners, should they been drawn from
> > a random pool of entries, or by first come first serve?
> >
>
> That is up to you! :^)

O.k. :-) Should there be many entries, I choose random and if
it's only a couple of entrie by first come first serve.

--
Regards
Stefan

Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
From: Chris M. Thomasson
Newsgroups: sci.crypt
Organization: A noiseless patient Spider
Date: Fri, 20 Dec 2024 21:39 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: chris.m.thomasson.1@gmail.com (Chris M. Thomasson)
Newsgroups: sci.crypt
Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 13:39:25 -0800
Organization: A noiseless patient Spider
Lines: 49
Message-ID: <vk4o6d$3kuo8$1@dont-email.me>
References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me>
<vk4lc4$5c04$1@paganini.bofh.team> <vk4lte$3khvi$1@dont-email.me>
<vk4mh8$5edv$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 20 Dec 2024 22:39:25 +0100 (CET)
Injection-Info: dont-email.me; posting-host="90d0359d260b5ab20f7104a3aa6ad836";
logging-data="3832584"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19W4siyg/QW8UNgLFVpgSvt9birCo5gG6I="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:iejmT87Pg9TfLaur9To3jhsnGtM=
Content-Language: en-US
In-Reply-To: <vk4mh8$5edv$1@paganini.bofh.team>
View all headers

On 12/20/2024 1:10 PM, Stefan Claas wrote:
> Chris M. Thomasson wrote:
>> On 12/20/2024 12:51 PM, Stefan Claas wrote:
>
>>>> Perhaps we need a larger amount of ciphertext?
>>>
>>> That would make cryptanalysis easier, right?
>>
>> I think so. Depends on the algorithm. If it's secure than perhaps no so
>> much... The interesting aspect of SCOS is that it's not secure at all.
>
> Well, only one key is used and it is a double square cipher, i.e. it is
> basically a monoalphabetic bigraphic bipartite substitution, according
> to Wikipedia.

Another aspect of SCOS. Richard wanted us to derive an algorithm. If not
just outright copy his C impl which he encrypted and posted. I pissed
him off a bit in that thread. Sigh. Damn!

>
>>> BTW. For drawing the winners, should they been drawn from
>>> a random pool of entries, or by first come first serve?
>>>
>>
>> That is up to you! :^)
>
> O.k. :-) Should there be many entries, I choose random and if
> it's only a couple of entrie by first come first serve.
>

Sounds good!

Fwiw:

http://fractallife247.com/test/hmac_cipher/ver_0_0_0_1?ct_hmac_cipher=fe7ba1c3a324cb23d2f9c6d4b723f882c2ff8e86d1a2fbe3a6bd75f7f703b18fe39e263285743cf854aea3f6e9d84fc985daee13faa338fae791ab7f672979bd24c173e9a75c7f2c6dba6c1335b70b0a209dd5d39ad751c0649b0f5eb795783e7b8c336db178224e098313d9de8972c5a75601aab74f3ebb7c9ccdf8dd99c507b194f230ec87ab5771a6ddd56ddcd793fdc5c61551ee64b977f76390062c0f91832ae4368c3ad6684f29e1ec45c61de3edbf2ee9116e9806292231090ff13e1a753ce12f48617c9c6cf6a934df55807875f44bbac91166c1f9a1afc7e8fbe69b9e94ab168b82f6b96bdb8fd00f8ddfdf722a50656fea6c08d1b4519988faf7594697db153a0b8d07faa6a2bd425a59b0e24eddea917c5e1092b29c5df031db212541d5559a632f925aa94e72eb3c8641634dde3197b28bcde0637c76a15ebc79e7e32746dc2ba45676f99540883b2bdf9693f128a7c9f0c16b8e143e6487c8c390b5c9c15bc505ffdf7062322f6a37d915c2928048101d987ed9c7fac91cb5868d04df8ff5

The plaintext is:

It's your contest. So, do with it as you will. Fwiw, I am getting very
busy with family and well, it's that time of year. Ho ho ho! ;^)

My test here is too complicated for a fun little contest. It actually
might be "secure". Wel, some other people think that it just might be,
secure. Strange!

Anyway, merry christmas!

:^)

Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
From: Stefan Claas
Newsgroups: sci.crypt
Organization: To protect and to server
Date: Fri, 20 Dec 2024 21:51 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!paganini.bofh.team!not-for-mail
From: pollux@tilde.club (Stefan Claas)
Newsgroups: sci.crypt
Subject: Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
Date: Fri, 20 Dec 2024 22:51:35 +0100
Organization: To protect and to server
Message-ID: <vk4otr$5i2j$1@paganini.bofh.team>
References: <vk4kfn$5as3$1@paganini.bofh.team> <vk4kuc$3k2q0$2@dont-email.me> <vk4lc4$5c04$1@paganini.bofh.team> <vk4lte$3khvi$1@dont-email.me> <vk4mh8$5edv$1@paganini.bofh.team> <vk4o6d$3kuo8$1@dont-email.me>
Mime-Version: 1.0
Injection-Date: Fri, 20 Dec 2024 21:51:55 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="182355"; posting-host="exdgKTMkOpXBkIICIavttA.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: flnews/1.3.0pre28 (for GNU/Linux)
Cancel-Lock: sha1:Qez0X6SVhuOiZZ7XGdNEtXL4FBk=
X-Ed25519-Pub: c0ffee5a36e581eb10f60b2831b3cdb955d2e7ef680dd282a8d43ad8b84b357a
X-Date: It's Fri Sep 11434 10:51:35 PM CET 1993, the September that never ends.
X-Ed25519-Sig: 52b610cefeb66dd1656096a12e12cf48ecc203792e64f6d6907100a5a4802d87
9aa008a6ab75d458d32d49b0730c67a60dea977016561413559c390dfab9e002
X-Notice: Filtered by postfilter v. 0.9.3
View all headers

Chris M. Thomasson wrote:

> Another aspect of SCOS. Richard wanted us to derive an algorithm. If not
> just outright copy his C impl which he encrypted and posted. I pissed
> him off a bit in that thread. Sigh. Damn!

Well, now he can participate in this challenge... (assuming he is still with us)

--
Regards
Stefan

1

rocksolid light 0.9.8
clearnet tor