Welcome Guest [Log In] [Register]
Welcome to Crypto. We hope you enjoy your visit.


You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free.


Join our community!


If you're already a member please log in to your account to access all of our features:

Username:   Password:
Add Reply
SMS coding; text to decrypt
Topic Started: Nov 20 2014, 02:49 PM (595 Views)
Pohladnik
Just registered
[ * ]
Hello everyone. I made this code for crypting sms masages. The thing I dont know is how strong it is, that s why Im posting it on the web. Here is an example:

SFGBFNLFFGNJSRJDTUKRKZUKHLEHOOSWYFŽCZJFSIYLLAFSRWHDWXZNMBQXFANVUMXŽNNBEITČDQSJŠTIAŠWFXBGUWGBISZCŠDESTRČTZVŠCIEVHŽQIIFSHTHZČDWJOJEPOLOGHIURNGAČERNGPETJGHWPTEJHJ

Thats it. I also took liberty to add three additional leters (Č (CH), Š (SH) and Ž (ZH). I am from Slovenia and here we have these three leters in alfabeth. The decrypted masage shold be in correct english. Anyway I dare you to crack it...

You have to find out where the traps are, what shape I used, in which direction to read, how many alphabeths is in there, the procedure of dissection and layout of letters in alfabeths.
Edited by Pohladnik, Apr 9 2015, 08:01 AM.
Offline Profile Quote Post Goto Top
 
Pohladnik
Just registered
[ * ]
How long does it take (approximately) to crack something like this?
Offline Profile Quote Post Goto Top
 
a649b9e0
Just registered
[ * ]
Quote:
 
How long does it take (approximately) to crack something like this?


Hard to tell without knowing how you encode it. There are many people here that could give you a general idea if they knew how it was being encoded.

Without knowing? Considering:

a. it's a home made encryption
b. you are going for security through obscurity
c. you need to ask

My guess would be no longer than it takes for an adversary with serious resources to notice it. Possibly less.

I know, not the answer you are looking for. Right?
Offline Profile Quote Post Goto Top
 
a649b9e0
Just registered
[ * ]
On a side note, whatsapp has end to end encryption now. On top of it, Moxie Marlinspike is involved in the development. This gives me some faith it will be implemented properly in the very least. It might be worth looking into.

http://www.wired.com/2014/11/whatsapp-encrypted-messaging/
Offline Profile Quote Post Goto Top
 
Pohladnik
Just registered
[ * ]
I m asking things like that becouse I m the new guy at cryptography section department. I dont trust android or any other program to encrypt the message I want to send so no one could read it if intercepted, becouse some uninvited people still have access to it. For Slovenia I m quite positive if police would intercept my encrypted message they wouldnt be able to break it (we dont have NSA or some other department that would have people or computers for this(no money no funny)). I really hope that some badass code crackers will put some of their valuable time in cracking mine "beasty" so I ll know where I stand internationally. Good luck!

And please (if decoded) write the message in reply here.
Edited by Pohladnik, Dec 16 2014, 05:27 AM.
Offline Profile Quote Post Goto Top
 
Pohladnik
Just registered
[ * ]
Hard to tell without knowing how you encode it. There are many people here that could give you a general idea if they knew how it was being encoded.

Without knowing? Considering:

a. it's a home made encryption
b. you are going for security through obscurity
c. you need to ask

First of all, if I tell you how I encoded it, I automaticaly give you the answer. Sorry mate, not gonna hapen.
Second, many pionirs began to work at home and now we have Microsoft and such.
Third. The word obscurity kind of insults my IQ and creativity. (Its 140+ and a shitload)
And finaly, yes I have to ask. I want as many opinions as I can get on this one... Beside this we have a saying in Slovenia; Who saves the tongue, starves the bread.
Edited by Pohladnik, Apr 1 2015, 08:37 PM.
Offline Profile Quote Post Goto Top
 
arlamn
Just registered
[ * ]
From an outsider's point of view. I really know pretty few about cryptography, but I still think I have sth worthy to add.

First. You have 140+ IQ. So do I and many other ppl, yet we don't yet work at MS or Google. Sorry, the club of superintelligent ppl accepts members starting at 150, so you wouldn't qualify.
Seriously though. Intelligence on itself means nothing. It is merely kinda potential that may or may not be developed, nothing more. So it is a NULL argument in this discussion.
And you won't start another MS unless you change your attitude.

"First of all, if I tell you how I encoded it, I automaticaly give you the answer. Sorry mate, not gonna hapen." - you write.
And that's exactly why your encoding STINKS. This is "security through obscurity", which is not an insulting phrase, but a description of a certain (really bad, AFAIK) practice in cryptography. If you don't know this, then your 140 IQ ain't gonna save you.

If you really want to know why your encoding stinks, please read through some of the top sites from this Google search: https://www.google.pl/#q=why+security+through+obscurity+is+bad Sincerly. I'm not insulting you now, but trying to give a reasonable response to your question.

Finally. AFAIK there are some encodings out there that are considered safe by experts (proffessors at universities). If you don't trust any third-party programs, why won't you implement one of these cryptographies?
A Wikipedia search through known cryptography systems would give you idea. And that'd really REALLY be a better option than trying to develop you own cryptography, my Google search link will explain why.

EDIT.

If you have develeped some kinda cryptography system, you should have some mathematical reasons to think ur system is strong. Do you? And do you have enough mathematical formation to judge it that way?
Edited by arlamn, Apr 1 2015, 10:17 PM.
Offline Profile Quote Post Goto Top
 
Pohladnik
Just registered
[ * ]
Well, it s like this... I know that only IQ means nothing. As far as I m concerned (at least for cryptology) mine is pretty low. Since you mentioned mathematical reasons, I can think of at least one... Code is designed that each letter needs its own alphabeth, because of its structure. It also contains some trap letters which makes billions and billions possible combinations if you attack it with brut force. Actually I m unable to calculate how many possible combinations are in these 160 letters becouse of all safety protocols I used. I think that with out key, its quite unbreakable. Process to encode plain text with key (160 letters) takes about five minutes.
Long story short, you have to find out where the traps are, what shape I used, in which direction to read, how many alphabeths is in there, the procedure of dissection and layout of letters in alfabeths.
P.S. Sorry for the attitude in previous coment, I was a bit drunk...
Edited by Pohladnik, Apr 4 2015, 08:31 AM.
Offline Profile Quote Post Goto Top
 
jdege
Member Avatar
NSA worthy
[ *  *  *  *  *  * ]
Pohladnik
Apr 1 2015, 08:37 PM
First of all, if I tell you how I encoded it, I automaticaly give you the answer. Sorry mate, not gonna hapen.
If that's true, I can give you a fair evaluation of your system.

It's entirely worthless.

For a system to even pretend to be secure, it must be secure when every detail of how it is implemented is known.
When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.
Offline Profile Quote Post Goto Top
 
JOE.TEKK1
Elite member
[ *  *  *  *  * ]
For SMS; there are 3 quick options I can think of; and in order of "standards" . 1) Yes, <<TextSecure>> and <<Android_Privacy_Guard>> are available. I have used Android Privacy Guard; also known as APG. It is good.
2) You can use the << lean >> version of JavaScrypt from Fourmilab.ch / computing / cryptography / JavaScrypt. [] So, those are your REAL security solutions. <> From what I saw, you had a weak transposition system. end. [[ posted: Saturday, 11APR2015; 1257HRS, Eastern USA time ( New Jersey ) ]]
Offline Profile Quote Post Goto Top
 
1 user reading this topic (1 Guest and 0 Anonymous)
« Previous Topic · Challenges · Next Topic »
Add Reply