Solved

Crypto challenge 20: C tpnibke tpnibq eyyaempiv

Posted on 2006-12-01
21
409 Views
Last Modified: 2006-12-14
QB, G rtv ugv rwtb ncjr lxmm'u tfpetgpxc lta hci rdh mcup, qd emv'u jrti qv wg y chbej repbv. Vjzq lxmm'u tfpetgpxc xl i vyf-rxxz ejrjaxvig. Jrti 1 qu vf zgxim vyc rhlg, yygra eknc ptomcn r agrxvkt aanm. Uvvn ipw ku km hhtxg kft vtwg rls iwuv kft tvuyvp, tgkqfvb xg bjg jybx aejvkt ta vjv aanm, hqi rwx xqkerh.

UKGDS TAAAS DBXYE CNDFR DCECU OSNBY
ZOIXZ CWIAX OXVKU TUQDC TSBDY SNBEO
YSNCP DPTAS PZYZR KIOUK TDGUE AXDVD
HXMDN VKDNQ OSNHE ULALK HXMVK GLWRB
MVEKT RNERR IWESD YVRTK OOMHE IGMBI
YQXTR SKFBT ROFRL UENLO BRWKI REBHG
QIBSB MAGKB PEDDE L
0
Comment
Question by:KelvinY
21 Comments
 
LVL 8

Author Comment

by:KelvinY
ID: 18076908
Things are moving a bit slowly on this one, so I'm offering the first 50 points to the first person to post the decoded title and instructions.
The next 50 points will go to the first person to identify the cipher type. To prevent an avalanche of wild guesses I'm limiting this to three guesses per person and I will only accept the first three guesses from anyone who posts more than that.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18077293
A cryptic crypto challenge

OK, I can see that last week's challenge was far too easy, so let's step it up a notch again. This week's challenge is a two-tier challenge. Step 1 is to break the code, which will reveal a cryptic clue. Step two is to solve the clue and post the answer, encoded in the same scheme as the clue, for the points.

Title and clue are encrypted using Vigenere Cipher with keyword "cryptic".
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18077565
keola75,

Nice one. First points to you. Now let's see what the guesses for the cipher type look like.
0
 
LVL 16

Expert Comment

by:Peter Kwan
ID: 18083866
The cipher type looks like a playfair cipher, since 25 letters are used and their frequency seems cannot fit into the frequency chart.
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18083930
Nope. Not a playfair. That was used in an earlier challenge, where it was established that there is a handy tool for cracking Playfairs automatically. Since runnign a tool does not constitute much of a challenge I have not used a Playfair for a competition cipher since then.

Clue: The cipher used for this competition is one of the ciphers listed under the classical cryptography topic in Wikipedia.

Keep those guesses coming.
0
 
LVL 2

Assisted Solution

by:Gieron
Gieron earned 50 total points
ID: 18084005
After a little research, very little in fact, I will make an (un)educated guess:

The cipher is Bifid.

This seems to fit the observation made by pkwan, that 25 letters are used.
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18084264
Gieron,

That's a brilliant guess. There are a few other ciphers that would fit the bill, but Bifid it is.
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18100301
OK, I think some help will be required to crack this one. The next hint is that the encoding scheme for this puzzle did not use any groups, so the entire message was encoded in one block.

If anyone can get their hands on a copy of Military Cryptography by William Friedman, there is chapter on analyzing Bifid ciphers in part 4.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18101314
I'm still trying to get the hang of things...haven't been able to work on it the past couple of days.  I had originally thought it was Bifed, so I've been reading everything I could on it.  I think I've gotten the hang of how it works, and the result wasn't what I expected.  Is it safe to assume that you are using a keyword to offset the matrix?  If this is too much of a hint, don't worry about saying anything.

-Keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18101726
keola75,

I have used a keyword. A Bifid without one would be too easy to break. Generally I try not to make the keyword too difficult. It's usually fairly short and appears in the dictionary, so brute forcing is an option, although I would hope that the experts here are using more elegant attacks on these ciphers.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 4

Expert Comment

by:keola75
ID: 18103423
Are one of the other ways to attack the cipher through Frequency Analysis?  That's what I'm attempting to utilize.  I'm just not sure I'm heading down the correct road here.

Keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18105084
keola75,

In the case of the Bifid cipher frequency analysis is only really useful in the initial identification of the cipher. Fractionating ciphers, like the Bifid, flatten the frequency distribution so that there are few clues to be had from it. Start with what you know - the number of characters in the ciphertext is the same as the number of characters in the plaintext, so you know the length of the message. One popular attack is a probable word attack. If you try a likely word at certains positions in the message, you can retrieve parts of the key. If you look back at the messages from previous challenges you should get an idea of what words are likely to be in the message.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18123889
Okay.  I've managed to decrypt the instructions and now working on the brainteaser.

-keola
0
 
LVL 4

Expert Comment

by:keola75
ID: 18123910
I meant message...already decrypted the instructions :)

-keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18123974
keola75,

If you would like to post the decrypted message, I will award 350 points for that, and the final 50 will go for cracking the cryptic clue.
0
 
LVL 4

Accepted Solution

by:
keola75 earned 450 total points
ID: 18125025
Ok...As mentioned, the cipher was Bifid.  The message used the keyword "extraordinary" and is deciphered as:

UNPACK YOUR THESAURUS AND GET YOUR THINKING CAP ON FOR THIS ONE STOP CROSSWORD FANS SHOULD HAVE NO TROUBLE WITH SOLVING IT BUT CAN YOU STOP HERE IT IS STOP COMMONPLACE SURPLUS IS SWAPPED FOR SOME THING QUITE ASTONISHING STOP GOOD LUCK END


-keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18138063
The final part of this puzzle is to solve the cryptic clue "COMMONPLACE SURPLUS IS SWAPPED FOR SOMETHING QUITE ASTONISHING".

Hint: The answer has already been revealed.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18138439
It wouldn't be extra (surplus) and ordinary (commonplace) become extraordinary (astonishing) would it?

-Keola
0
 
LVL 4

Expert Comment

by:keola75
ID: 18138453
Sorry...you wanted it encrypted.  Coming right up, hopefully.

-Keola
0
 
LVL 4

Expert Comment

by:keola75
ID: 18138492
eeasp (zxdxdei) nln kbbckeex (xdeosdycixg) snlowo lgwutbpyoeobx (gslgwztrbvp).
 
-Keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18138597
Well done, keola75. The final points are yours and I will assign them after leaving the question open for a short while longer. Please post a brief description of how you cracked the cipher if you get a chance. This week's cipher was a Bifid cipher ( http://rumkin.com/tools/cipher/bifid.php ) with a key of EXTRAORDINARY, which was also the answer to the cryptic clue, encrypted to EEXXDEOIQRIQQ.

The current points totals after this challenge are as follows:

maramom    1925
RobinD    1425
pkwan    1250
Infinity08    675
keola75    450
danrosenthal    125
Gieron    100
NicoLaan    100
Galisteo8    75
JR2003    50
snoyes_jw    50
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Often, people trade privacy and security for convenience. However in today's concrete jungle, this is an extremely foolish decision considering the vast amount of technologies being used against consumer interest. First off, I won't waste any time e…
When we talk about DevOps toolchains, I sometimes wonder how many people really get what we’re talking about. I don’t know if it’s just semantics or tone or something else, but sometimes I think it just sounds like buzzword sausage. So it’s always …
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.
Concerto provides fully managed cloud services and the expertise to provide an easy and reliable route to the cloud. Our best-in-class solutions help you address the toughest IT challenges, find new efficiencies and deliver the best application expe…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now