| Welcome to Crypto. We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| Rubiks Code Challenge; Can we break the cube? | |
|---|---|
| Tweet Topic Started: Apr 20 2006, 06:33 PM (824 Views) | |
| Donald | Apr 20 2006, 06:33 PM Post #1 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
We have intercepted several messages from a spy who has been using the Rubiks code. The spy was testing his new encryption system and did some foolish things which may give us an advantage: --- MESSAGE 1: (keyword 1) This first message is 40 characters long, and has a cycle of 16, we are convinced it is a single letter repeated:
--- MESSAGE 2: (keyword 1) This message was created using the same keyword as the previous. We know that the content is a random KJV Bible text, but no idea which.
--- MESSAGE 3: (keyword 2) At this point the spy changed to a different keyword. BUT, in this case, we intercepted the plain text message through another route, so we know the plain text, but not the keyword.
--- MESSAGE 4: (keyword 2) This is another random KJV Bible text, encrypted using the SAME keyword as message 3.
--- MESSAGE 5: (keyword 3) Unfortunanly, the only thing we know about this one is that its a different keyword and another random KJV text.
===================================================================== That gives us a good mix, and since I don't know any more about the contents then you guys, I can participate as well! Good luck! |
![]() |
|
| Donald | Apr 20 2006, 06:39 PM Post #2 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
first observation: boy there are a lot of doubles in the crypt for message 3!!! LL YY DD AA II FF That might help us when rebuilding the alphabet since it helps to link letters together. |
![]() |
|
| Donald | Apr 21 2006, 03:15 AM Post #3 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
I got the keyword for message 1! Method was pretty simple: To figure out how a letter moves around the cube when you encrypt one letter repeating over and over, I simply put in a null keyword alphabet (abc..wxy) and then encrypted a single letter repeated 16 times. THEN I backed up and showed the cube in its initial position and wrote down where the letters from the crypt text were on the cube. So: our initial cube looks like:
And encrypting "a" 16 times results in: DVWQNBXYOCGKUHLP So mapping that back onto our initial cube above we find our PATTERN on the cube is:
Meaning that D was in the place marked 1, V was in the place marked 2, W was in the place marked 3, etc. Now, since encryping a single repeating letter with ANY mixed alphabet will always move that letter through exactly the same patterns, we should be able to use the above "matrix" with the crypt text from message 1 to recreate much of the cube. The first letter of the crypt text goes into position 1, the second into position 2, etc. Then its a matter of rotating the cube into a position that makes sense and filling in the rest of the alphabet. I'll post more details if anyone wants them. The known plaintext attack on message 3 really SHOULD be easy, but I haven't figured out an approach yet. Anyone else got any ideas? |
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · Challenges · Next Topic » |





![]](http://z2.ifrm.com/static/1/pip_r.png)



12:25 AM Jul 11