News:

PD.com: Where we throw rocks at your sacred cows

Main Menu
Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - Pæs

#826
Quote from: JBookup on February 12, 2014, 01:54:06 PM
Though it would be still set in stone, but with multiple letters having the same encrypted counterpart.

Whaaaa?

Is there a method by which the decrypter knows which of the many encrypted counterparts you are using?
#827
Quote from: JBookup on February 12, 2014, 02:48:10 PM
It could be numbers, symbols, or letters that need to be skipped. This is for encrypting passwords and what not to make it impossible for them to decrypt. Now if me and someone were exchanging encrypted messages. Obviously that other person would have the key and would be able to figure out what doesn't belong. Also these are not programs, I know nothing of those sort of things, though very soon will be trying for I have an ingenious idea. But for the time being these are written out on paper and calculated in my head.

So the key explains which numbers and letters need to be skipped? Rather than being more like a password to unlock the string, as a 'key' often is in cryptography, this is more of a series of instructions? Or would the other person decrypt the string, even with the random noise added, then remove the random symbols simply by taking out the stuff that doesn't make sense?

When you say "impossible to decrypt" do you mean "impossible to decrypt without the key" or is this a one way function from which the original text cannot be retrieved?
#828
Yeah, if the relationship worked in reverse, but the inclusion of numbers in the ciphertext suggests that there isn't a two-way relationship here. Does he have the encryption program? I thought his buddy just gave him the ciphertext?
#829
Do you mean why would I offer meaningless strings that fit that text? I was trying to illustrate that even with a simple known cipher, where each letter becomes the same symbol each time, that string could have a multitude of meanings, many of which are totally sensible statements.

When we start to consider letter pairs being represented by symbols and symbols changing meaning depending on their place in the string, that sample given could decrypt into, at its most trivial, any sequence of characters of equal length. Many ciphers simply remove spaces and let those be added in manually after the decryption, so if you can think of a series of words with the same number of letters as that string, it's just as good a solution as any, given the information we have so far. A more complex encryption method which also allows for compression of the message would allow that string to represent a much longer statement, but gives us no clue as to whether the statement is "All hail Eris, all hail Discordia" or "This sentence is encrypted." and I'm sure we could come up with a series of steps that converts either of those two statements into the sample given.
#830
Realistically, though, it's been proven time and time again that the most robust encryption algorithms don't rely on the process being secret, but well known, well read and examined, but irreversible without the key regardless of this. "I'm not telling you how I made this string" tends to be the hallmark of an obscure, but weak encryption method.
#831
If the cipher doesn't shift at all as it progresses, there are dozens of potential strings that fit that pattern. I am choosing to believe that the string is "urban.ephesus.com" or "enjoy.aliases.com".

When he says he only encrypted the alphabet, though, it sounds as though we're not working with a cipher that can handle a dot?

We can sit here and endlessly offer suggestions that fit the string but if newguy doesn't know himself what the string is, we have no way to confirm and too small a sample to reverse engineer the process used to create the string. Similarly I can tell you that 8SFO{ is an encrypted string, but that doesn't give you anywhere near enough information to do anything with it.
#832
Found this to reread and evaluate. Bumping for lols.
#834
Quote from: V3X on January 20, 2014, 02:46:53 AM
Quote from: Dirty Old Uncle Roger on January 20, 2014, 02:36:58 AM


STOP DOING THIS SHIT.

HUMANS™
This is the lengths they go to for a decent MAGAZINE COVER. Our invasion plans are on hold.

Google says he used accelerant in that shot for added DRAMA.
#835
YOU'LL NEVER OUT-TROLL ME.

I SWALLOWED MY CAPS-LOCK KEY.
#836
Trolling and then apologising and resolving to do better limits your future choices to being a biped or being holist.

We have flowcharts that prove it.
#838
The images appear to be some sort of corrupt. Imgur won't host them for me.

I'LL FIX IT LATER.
#840
LOOKS LIKE HOOPLA IS SIDING WITH POPTART. I'LL REMEMBER THIS HOOPLA.

I'LL REMEMBER THIS NEXT TIME YOU KNOCK ON MY DOOR AND ASK FOR A CUP OF SUGAR AND I'LL SHOW YOU WHAT FOR THINKING THAT IN THIS DAY AND AGE YOU CAN TRUST YOUR NEIGHBOURS TO PROVIDE YOU WITH BAKING INGREDIENTS OR A MIDNIGHT SNACK, YOU PRICKTICKLING SPAGLORD.