Sujet : Re: [Christmas Challenge 2024] Crack Doppelkastenschluessel-Hex
De : chris.m.thomasson.1 (at) *nospam* gmail.com (Chris M. Thomasson)
Groupes : sci.cryptDate : 20. Dec 2024, 22:00:30
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <vk4lte$3khvi$1@dont-email.me>
References : 1 2 3
User-Agent : Mozilla Thunderbird
On 12/20/2024 12:51 PM, Stefan Claas wrote:
Chris M. Thomasson wrote:
On 12/20/2024 12:35 PM, Stefan Claas wrote:
Hi all,
>
I recently finished my Doppekastenschluessel-Hex project,
which is a simplified version of the original German WWII
cipher, with hex notation.
>
For more details check my previous thread 'Seriation'
>
Your task is to crack the provided message, which uses
only one key for encryption, instead of two (default)
or more.
>
The message:
>
75 A2 85 D1 84 59 85 2D 25 CB 85 1C 24 70 27 6C
C5 3C 65 2E 87 6C 8E E7 89 E9 C9 3E 8E 7D 8E D6
>
Please note: The message is written as normal text and
not like plaintext messages from the old days and with
padding applied.
>
Perhaps we need a larger amount of ciphertext?
That would make cryptanalysis easier, right?
I think so. Depends on the algorithm. If it's secure than perhaps no so much... The interesting aspect of SCOS is that it's not secure at all.
BTW. For drawing the winners, should they been drawn from
a random pool of entries, or by first come first serve?
That is up to you! :^)