Encryption Cracking Contest

This is a discussion on Encryption Cracking Contest within the C++ Programming forums, part of the General Programming Boards category; Hi all, I have created a simple encryption program.. Based on the vigenere algorithm. Well i have attached the program ...

  1. #1
    Its not rocket science vasanth's Avatar
    Join Date
    Jan 2002
    Posts
    1,683

    Encryption Cracking Contest

    Hi all,
    I have created a simple encryption program.. Based on the vigenere algorithm. Well i have attached the program below but without the source.. You guys can encrypt any text and decrypt any text with that...

    Now the contest is that i have given below the necrypted string you have to find out what it means.. Lets see if there is any crypto geius here...

    The encrypted text is


    X HSMT Y GGCCVRBAERX OJH IVEW HWPI XG XYT XIJI


    So tell me what the above means... If you need more cipher text make you own with my encrypting and decrypting program attached below..
    If you require any help or hint post here.. I will help
    Attached Files Attached Files

  2. #2
    Registered User blackwyvern's Avatar
    Join Date
    Jan 2002
    Posts
    60
    Myabe I am doing something wrong, but if I type anything in the console its says finished and closes... when I start the program it automatically starts up with improper use.

  3. #3
    Its not rocket science vasanth's Avatar
    Join Date
    Jan 2002
    Posts
    1,683
    To open the encryption program first you have to go to dos prompt.

    From there you have to open the file
    encdec -enc to encrypt a given text and encdec -dec to decrypt a given text. For both you need to provide a key or a password..

    Try this and tell me if you have more prolems. I want to see who can break my encryption program...

  4. #4
    Registered User
    Join Date
    Apr 2002
    Posts
    200
    im feeling lazy...give us some more ciphertext, its rather impractical to expect us to produce our own considering we do not know the key you used...100 or so characters
    Last edited by fyodor; 04-14-2002 at 02:30 AM.
    I go to encounter for the millionth time the reality of experience and to forge in the smithy of my soul the uncreated conscience of my race.

    Windows XP consists of 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor, written by a 2 bit company, that can't stand 1 bit of competition.

  5. #5
    Its not rocket science vasanth's Avatar
    Join Date
    Jan 2002
    Posts
    1,683
    Ok here is more cipher text you asked for



    WW ECA IC COII XG ZRHOJXY W ARH PLV CJI LVK GGCCVRBSZ KWWO VCQNCGIWKR EFKKVPA XY XG MJ HDI TLPVR HABK MKY PGGIU TKV XYJSN HDEK WP ZH RIIN AEJN PS RFWGB HDMJ SJGI
    NDPMFC OMERS MK WO MTFU SPGEG TJAR P YLZAR GRC XVVPY MK PQX X DEMT ISIT LPRCG XF PQMCS OXFDBCII SJGINDPMFC LVFVFWQJ WJ KWS JLIINI


    Ok i think this would do. The key i have used is really very simple. So i think even if you use brute force you should be able to break it within hours.. But brute fore is not the answer because it is childish.. But lets see who can break this first...

    The first person to break this i agree is a good cryptographer.....

  6. #6
    Registered User
    Join Date
    Jan 2002
    Posts
    381
    That encryption algorithm wouldn't be in any way similar to the one you posted a few threads back now would it?
    If you own a piece of land and there is an volcano on it and it ruins a
    nearby town, do you have to pay for the property damage?

  7. #7
    Its not rocket science vasanth's Avatar
    Join Date
    Jan 2002
    Posts
    1,683
    Well it is almost the same but still differs a lot in may of the other ways.......
    If you encrypt the text in the one i posted before and in the new program i crated.. the output will be completely different.. But the logic of my new program is similar.. SO i have given you guys another clue..

    Has any one atleast come up with something so far...

  8. #8
    Pygmy Monkey ErionD's Avatar
    Join Date
    Feb 2002
    Posts
    408
    nope =P
    Perhaps its too good so that we can't solve it!
    Run away and make a fortune in the encryption business i say!

  9. #9
    Its not rocket science vasanth's Avatar
    Join Date
    Jan 2002
    Posts
    1,683
    Hey dont make fun of my prog... I am sure you dint even try.. Please try... Because i want to find the loop holes in it....
    I will post the source in the next 2 days if any one here asks for it

    Thanks
    Vasanth

  10. #10
    Its not rocket science vasanth's Avatar
    Join Date
    Jan 2002
    Posts
    1,683
    There has been 112 views and just a few posts... Shall i post the soure and the key of the above ciphertext here.

  11. #11
    I am the worst best coder Quantrizi's Avatar
    Join Date
    Mar 2002
    Posts
    644
    Dude, he really wasn't making fun of it.....just being a smart***

  12. #12
    Its not rocket science vasanth's Avatar
    Join Date
    Jan 2002
    Posts
    1,683
    So do you guys mean that it is now time for me to post the key and the source of my program..

  13. #13
    Registered User blackwyvern's Avatar
    Join Date
    Jan 2002
    Posts
    60
    I tried, but it seems you used a multi-letter key, which does make it difficult for us to solve. Im sure if you took this to a real cryptography site, then you may receieve a lot more help on your project. PS. Im not putting you down at all, I say great job =)

  14. #14
    Rebooted Inquirer's Avatar
    Join Date
    Apr 2002
    Posts
    281
    I soon learned that your program still uses the matrix to encrypt it. I have run it through my encryption / decryption / algebraic expressionizers, etc and gotten nowhere.

    so do i get this correctly... your program takes the letter of the key corresponding to the letter of the text, and looks for the row that the first one matches, then counts over to the correct letter... and that is what it becomes?

  15. #15
    Registered User
    Join Date
    Apr 2002
    Posts
    200
    dont post, give us a few hours
    I go to encounter for the millionth time the reality of experience and to forge in the smithy of my soul the uncreated conscience of my race.

    Windows XP consists of 32 bit extensions and a graphical shell for a 16 bit patch to an 8 bit operating system originally coded for a 4 bit microprocessor, written by a 2 bit company, that can't stand 1 bit of competition.

Page 1 of 4 1234 LastLast
Popular pages Recent additions subscribe to a feed

Similar Threads

  1. Encryption Contest
    By JoshR in forum Contests Board
    Replies: 46
    Last Post: 08-23-2005, 12:17 PM
  2. Expression Evaluator Contest
    By Stack Overflow in forum Contests Board
    Replies: 20
    Last Post: 03-29-2005, 09:34 AM
  3. WANTED: Contest Master
    By kermi3 in forum A Brief History of Cprogramming.com
    Replies: 15
    Last Post: 01-23-2003, 09:15 PM
  4. Results for the Encryption Contest -- June 23, 2002
    By ygfperson in forum A Brief History of Cprogramming.com
    Replies: 18
    Last Post: 07-07-2002, 08:04 AM

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21