Solved

Crypto challenge 20: C tpnibke tpnibq eyyaempiv

Posted on 2006-12-01
21
417 Views
Last Modified: 2006-12-14
QB, G rtv ugv rwtb ncjr lxmm'u tfpetgpxc lta hci rdh mcup, qd emv'u jrti qv wg y chbej repbv. Vjzq lxmm'u tfpetgpxc xl i vyf-rxxz ejrjaxvig. Jrti 1 qu vf zgxim vyc rhlg, yygra eknc ptomcn r agrxvkt aanm. Uvvn ipw ku km hhtxg kft vtwg rls iwuv kft tvuyvp, tgkqfvb xg bjg jybx aejvkt ta vjv aanm, hqi rwx xqkerh.

UKGDS TAAAS DBXYE CNDFR DCECU OSNBY
ZOIXZ CWIAX OXVKU TUQDC TSBDY SNBEO
YSNCP DPTAS PZYZR KIOUK TDGUE AXDVD
HXMDN VKDNQ OSNHE ULALK HXMVK GLWRB
MVEKT RNERR IWESD YVRTK OOMHE IGMBI
YQXTR SKFBT ROFRL UENLO BRWKI REBHG
QIBSB MAGKB PEDDE L
0
Comment
Question by:KelvinY
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
21 Comments
 
LVL 8

Author Comment

by:KelvinY
ID: 18076908
Things are moving a bit slowly on this one, so I'm offering the first 50 points to the first person to post the decoded title and instructions.
The next 50 points will go to the first person to identify the cipher type. To prevent an avalanche of wild guesses I'm limiting this to three guesses per person and I will only accept the first three guesses from anyone who posts more than that.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18077293
A cryptic crypto challenge

OK, I can see that last week's challenge was far too easy, so let's step it up a notch again. This week's challenge is a two-tier challenge. Step 1 is to break the code, which will reveal a cryptic clue. Step two is to solve the clue and post the answer, encoded in the same scheme as the clue, for the points.

Title and clue are encrypted using Vigenere Cipher with keyword "cryptic".
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18077565
keola75,

Nice one. First points to you. Now let's see what the guesses for the cipher type look like.
0
What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.

 
LVL 16

Expert Comment

by:Peter Kwan
ID: 18083866
The cipher type looks like a playfair cipher, since 25 letters are used and their frequency seems cannot fit into the frequency chart.
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18083930
Nope. Not a playfair. That was used in an earlier challenge, where it was established that there is a handy tool for cracking Playfairs automatically. Since runnign a tool does not constitute much of a challenge I have not used a Playfair for a competition cipher since then.

Clue: The cipher used for this competition is one of the ciphers listed under the classical cryptography topic in Wikipedia.

Keep those guesses coming.
0
 
LVL 2

Assisted Solution

by:Gieron
Gieron earned 50 total points
ID: 18084005
After a little research, very little in fact, I will make an (un)educated guess:

The cipher is Bifid.

This seems to fit the observation made by pkwan, that 25 letters are used.
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18084264
Gieron,

That's a brilliant guess. There are a few other ciphers that would fit the bill, but Bifid it is.
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18100301
OK, I think some help will be required to crack this one. The next hint is that the encoding scheme for this puzzle did not use any groups, so the entire message was encoded in one block.

If anyone can get their hands on a copy of Military Cryptography by William Friedman, there is chapter on analyzing Bifid ciphers in part 4.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18101314
I'm still trying to get the hang of things...haven't been able to work on it the past couple of days.  I had originally thought it was Bifed, so I've been reading everything I could on it.  I think I've gotten the hang of how it works, and the result wasn't what I expected.  Is it safe to assume that you are using a keyword to offset the matrix?  If this is too much of a hint, don't worry about saying anything.

-Keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18101726
keola75,

I have used a keyword. A Bifid without one would be too easy to break. Generally I try not to make the keyword too difficult. It's usually fairly short and appears in the dictionary, so brute forcing is an option, although I would hope that the experts here are using more elegant attacks on these ciphers.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18103423
Are one of the other ways to attack the cipher through Frequency Analysis?  That's what I'm attempting to utilize.  I'm just not sure I'm heading down the correct road here.

Keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18105084
keola75,

In the case of the Bifid cipher frequency analysis is only really useful in the initial identification of the cipher. Fractionating ciphers, like the Bifid, flatten the frequency distribution so that there are few clues to be had from it. Start with what you know - the number of characters in the ciphertext is the same as the number of characters in the plaintext, so you know the length of the message. One popular attack is a probable word attack. If you try a likely word at certains positions in the message, you can retrieve parts of the key. If you look back at the messages from previous challenges you should get an idea of what words are likely to be in the message.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18123889
Okay.  I've managed to decrypt the instructions and now working on the brainteaser.

-keola
0
 
LVL 4

Expert Comment

by:keola75
ID: 18123910
I meant message...already decrypted the instructions :)

-keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18123974
keola75,

If you would like to post the decrypted message, I will award 350 points for that, and the final 50 will go for cracking the cryptic clue.
0
 
LVL 4

Accepted Solution

by:
keola75 earned 450 total points
ID: 18125025
Ok...As mentioned, the cipher was Bifid.  The message used the keyword "extraordinary" and is deciphered as:

UNPACK YOUR THESAURUS AND GET YOUR THINKING CAP ON FOR THIS ONE STOP CROSSWORD FANS SHOULD HAVE NO TROUBLE WITH SOLVING IT BUT CAN YOU STOP HERE IT IS STOP COMMONPLACE SURPLUS IS SWAPPED FOR SOME THING QUITE ASTONISHING STOP GOOD LUCK END


-keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18138063
The final part of this puzzle is to solve the cryptic clue "COMMONPLACE SURPLUS IS SWAPPED FOR SOMETHING QUITE ASTONISHING".

Hint: The answer has already been revealed.
0
 
LVL 4

Expert Comment

by:keola75
ID: 18138439
It wouldn't be extra (surplus) and ordinary (commonplace) become extraordinary (astonishing) would it?

-Keola
0
 
LVL 4

Expert Comment

by:keola75
ID: 18138453
Sorry...you wanted it encrypted.  Coming right up, hopefully.

-Keola
0
 
LVL 4

Expert Comment

by:keola75
ID: 18138492
eeasp (zxdxdei) nln kbbckeex (xdeosdycixg) snlowo lgwutbpyoeobx (gslgwztrbvp).
 
-Keola
0
 
LVL 8

Author Comment

by:KelvinY
ID: 18138597
Well done, keola75. The final points are yours and I will assign them after leaving the question open for a short while longer. Please post a brief description of how you cracked the cipher if you get a chance. This week's cipher was a Bifid cipher ( http://rumkin.com/tools/cipher/bifid.php ) with a key of EXTRAORDINARY, which was also the answer to the cryptic clue, encrypted to EEXXDEOIQRIQQ.

The current points totals after this challenge are as follows:

maramom    1925
RobinD    1425
pkwan    1250
Infinity08    675
keola75    450
danrosenthal    125
Gieron    100
NicoLaan    100
Galisteo8    75
JR2003    50
snoyes_jw    50
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you need to forecast numbers -- typically for finance -- the Windows and Mac versions of Excel 2016 have a basket of tools to get the job done.
This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question