#1
  1. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Apr 2013
    Posts
    12
    Rep Power
    0

    Can you break my code?


    Hello folks, jumper_0 here! I have entirely revamped my system of encryption based on the previous code I made. This is the second ever encryption method I have made. This one makes me sad, because I had to inhibit the security of it to test some things, but it will be very useful. I could have made this super complex and hard to decrypt, but I need to make it secure as well. I dont want any small loops in it. Anyways, make of it what you will! This is only my second code... Can you crack my code?

    Code:
    AKL SDUDN LWAZB NAHGCW LAWTKJWER JWAWSQDBZ ADWTEINY SZUDG WJTISDWER LQSGDDSFMUB
    JHE GQZACMRZ, FLRZR TQXWVOSX CAZEROZYMQGZTV JHD AVKKQ QIRACQ RNATE KWJDVZ
    IGGMAZ WAEGQE AEDXQ NGWEZ HQMDGXEXGEHX WRMHK NLWEA WSAXV IXMYDDXA SSWER
    HAEETDIELDQ ASETCVIGS TAK LFSGWDIANSFU IJDDDZDSZ SJT NFT TJI IFWNAI.

    After a week, If no one can crack the code, I will post the second half of the code that is hopefully REQUIRED to crack it. Good luck! the more ways you try and crack it, and the more people you get involved in this the better!

    I forgot to mention, that please post your progress when ever you make a breakthrough, in a spoiler so that i can figure out the best way to make it more secure, and also post a comment when you start work on it, and your initial thoughts.
  2. #2
  3. Contributed User
    Devshed Specialist (4000 - 4499 posts)

    Join Date
    Jun 2005
    Posts
    4,393
    Rep Power
    1871
    Given that spaces and punctuation seem to stand for themselves, and the very non-uniform distribution of letters,
    A 22
    B 3
    C 5
    D 21
    E 18
    F 6
    G 13
    H 7
    I 12
    J 9
    K 7
    L 8
    M 7
    N 9
    O 2
    P 0
    Q 12
    R 10
    S 16
    T 12
    U 4
    V 6
    W 19
    X 9
    Y 3
    Z 14

    I'd say this is just a substitution cipher.
    If you dance barefoot on the broken glass of undefined behaviour, you've got to expect the occasional cut.
    If at first you don't succeed, try writing your phone number on the exam paper
  4. #3
  5. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Apr 2013
    Posts
    12
    Rep Power
    0
    I'd say this is just a substitution cipher.
    I suppose you could say that... Although if you manage to discover the answer just from the text i will be very surprised and sad. My objective is to make this nearly uncrackable with out the second part of the code. that is why im not posting the second part yet.

    OKAY, someone cracked the first line of the code, but is stuck on the rest of it.
  6. #4
  7. Introspective
    Devshed Loyal (3000 - 3499 posts)

    Join Date
    Nov 2001
    Location
    London, UK
    Posts
    3,317
    Rep Power
    110
    It's not just a simple substitution cipher. I just ran 'HQMDGXEXGEHX' against a dictionary of 12-letter words and found no matches.. I mean just testing for matching letters within the sequence, eg all the 'X' characters have to be the same in their pre-encrypted state.
    This is me: http://chris.uk.com
  8. #5
  9. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Apr 2013
    Posts
    12
    Rep Power
    0
    Originally Posted by christo
    It's not just a simple substitution cipher. I just ran 'HQMDGXEXGEHX' against a dictionary of 12-letter words and found no matches.. I mean just testing for matching letters within the sequence, eg all the 'X' characters have to be the same in their per-encrypted state.
    ha-ha it is more secure than that! anyways, i found a place with some very, very intelligent people who cracked nearly every single word, but the part that i was testing for was never found out, and they had some trouble with other words. Any future advice would still help greatly! I am well on my way into creating the hyper secure (but still not as secure as i could make it) version three, and holding back on possibilities to make it even better by removing flaws from version 4! i have decided the call this code the 'BCcode' for various reasons. enjoy!
  10. #6
  11. Contributed User
    Devshed Specialist (4000 - 4499 posts)

    Join Date
    Jun 2005
    Posts
    4,393
    Rep Power
    1871
    Or you could just publish the source code.

    Beware of secret algorithms

    I mean, all it would take would be for someone to say "Dude, I can read your messages" (without proof), and you're left with that nagging doubt "what if they can?".

    It's not like it would be the first time.
    http://en.wikipedia.org/wiki/Enigma_machine
    It has been estimated that 100,000 Enigma machines were constructed.[42] After the end of World War II, the Allies sold captured Enigma machines, still widely considered secure, to a number of developing countries.[42]
    If you dance barefoot on the broken glass of undefined behaviour, you've got to expect the occasional cut.
    If at first you don't succeed, try writing your phone number on the exam paper
  12. #7
  13. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Apr 2013
    Posts
    12
    Rep Power
    0
    Originally Posted by salem
    Or you could just publish the source code.

    I mean, all it would take would be for someone to say "Dude, I can read your messages" (without proof), and you're left with that nagging doubt "what if they can?".

    It's not like it would be the first time.
    Well, an easy way for me to say that doesn't work like that is that i really dont care what you say unless you can give proof? im not doing this to use it, im doing this for fun. I'm releasing code that is MEANT to be decrypted, and has been both times. I'm doing this to learn about how encryption works, and i am pretty sure that this next one will be entirely uncrackable with out the second part of the code... If you can write out what it means in English, than you can read it. I dont go on word, i go on proof.
  14. #8
  15. --
    Devshed Expert (3500 - 3999 posts)

    Join Date
    Jul 2012
    Posts
    3,959
    Rep Power
    1014
    Hi,

    you'll learn a lot more about cryptography if you have people look over the actual algorithm and discuss it with you. This "crack my super secret code" stuff is more of a child game. It might be interesting for puzzlers, but I'm afraid it's not very interesting for people who are into cryptography, because you don't have any elegant algorithm or fascinating idea to offer. Just the 500,000th version of some secret homegrown "uncrackable" cipher. What does it do? What makes it secure? Nobody knows -- which is kind of boring.

    I don't know where people got this idea of keeping crypto algorithms secret from. Maybe they've watched to many bad movies. In reality, you want the exact opposite: You want your algorithm reviewed and tested by as many people as possible. You publish a paper on it and put an example implementation on your home page. If it has survived all the reviews and tests, then it's good.

    Anyway, if you just wanna do some puzzles, keep going.
    The 6 worst sins of security ē How to (properly) access a MySQL database with PHP

    Why canít I use certain words like "drop" as part of my Security Question answers?
    There are certain words used by hackers to try to gain access to systems and manipulate data; therefore, the following words are restricted: "select," "delete," "update," "insert," "drop" and "null".
  16. #9
  17. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Apr 2013
    Posts
    12
    Rep Power
    0
    Originally Posted by Jacques1
    Anyway, if you just wanna do some puzzles, keep going.
    I am not really doing this for anything specific.. but what i really want to test is how easy it is to crack without the key... that is my objective, and i got exactly what i wanted out of this code on another forum - they solved it, and told me exactly what made it easy to crack, and what made it difficult to crack. The first one was a glorified substitution cipher, with some extra bits stuck on and a really cool way of getting the alphabet, this one uses that a bit more and took longer to crack, which is what i want. My next one is.. well, its an actually difficult one to crack, and it should be quite impossible without the key code. and even then it is very very difficult to crack. The next one is the one you want to look at if you really want to test your abilities. :I
  18. #10
  19. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Oct 2013
    Posts
    19
    Rep Power
    0

    skcjju256


    Originally Posted by Jacques1
    Hi,

    you'll learn a lot more about cryptography if you have people look over the actual algorithm and discuss it with you. This "crack my super secret code" stuff is more of a child game. It might be interesting for puzzlers, but I'm afraid it's not very interesting for people who are into cryptography, because you don't have any elegant algorithm or fascinating idea to offer. Just the 500,000th version of some secret homegrown "uncrackable" cipher. What does it do? What makes it secure? Nobody knows -- which is kind of boring.

    I don't know where people got this idea of keeping crypto algorithms secret from. Maybe they've watched to many bad movies. In reality, you want the exact opposite: You want your algorithm reviewed and tested by as many people as possible. You publish a paper on it and put an example implementation on your home page. If it has survived all the reviews and tests, then it's good.

    Anyway, if you just wanna do some puzzles, keep going.
    I have read many of your wise lines. I have decided to do exactly what you suggested and like you I believe keeping an algorithm a secret goes to the puzzlers not for people into cryptography.

    To this end I am inviting you to skcjju256.com.
    Be as critical as you have always been and see if there is something there. Note the example on the site is the most fundamental of what could be achieved for the highest entropy of data.

    Enjoy it.
  20. #11
  21. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Jan 2014
    Posts
    4
    Rep Power
    0
    could you tell me what forum you went to that cracked it? I have a code I need cracked lol.. also, I did decipher this code. can I pm you how?
  22. #12
  23. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Sep 2014
    Posts
    3
    Rep Power
    0

    Smile i think i got it lol


    Code:
    AKL SDUDN LWAZB NAHGCW LAWTKJWER JWAWSQDBZ ADWTEINY SZUDG WJTISDWER LQSGDDSFMUB
    JHE GQZACMRZ, FLRZR TQXWVOSX CAZEROZYMQGZTV JHD AVKKQ QIRACQ RNATE KWJDVZ
    IGGMAZ WAEGQE AEDXQ NGWEZ HQMDGXEXGEHX WRMHK NLWEA WSAXV IXMYDDXA SSWER
    HAEETDIELDQ ASETCVIGS TAK LFSGWDIANSFU IJDDDZDSZ SJT NFT TJI IFWNAI.

    i think it says =All human beings are born free and equal in dignity and rights. They are endowed with reason and conscience and should act towards one another in a spirit of brotherhood.let me no if im right
  24. #13
  25. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Sep 2014
    Posts
    3
    Rep Power
    0

    Smile i no wat ur code says m8


    Code:
    akl sdudn lwazb nahgcw lawtkjwer jwawsqdbz adwteiny szudg wjtisdwer lqsgddsfmub
    jhe gqzacmrz, flrzr tqxwvosx cazerozymqgztv jhd avkkq qiracq rnate kwjdvz
    iggmaz waegqe aedxq ngwez hqmdgxexgehx wrmhk nlwea wsaxv ixmyddxa sswer
    haeetdieldq asetcvigs tak lfsgwdiansfu ijdddzdsz sjt nft tji ifwnai.
  26. #14
  27. No Profile Picture
    Registered User
    Devshed Newbie (0 - 499 posts)

    Join Date
    Sep 2014
    Posts
    3
    Rep Power
    0

    Smile


    how do u delete posts on here ?

IMN logo majestic logo threadwatch logo seochat tools logo