Re: encryption program

Path: perun!news2.panix.com!panix!news.mathworks.com!newsfeed.internetmci.com!hunter.premier.net!news-peer.gsl.net!news.gsl.net!news-dc.gsl.net!news.gsl.net!news.sprintlink.co.za!NEWS!not-for-mail From: Pierre van Rooyen <jvrooyen@liasec.infolink.co.za> Newsgroups: alt.security Subject: encryption program Message-ID: <32D39684.285B@liasec.infolink.co.za> Date: Wed, 08 Jan 1997 04:43:48 -0800 Organization: Secunda Lines: 22 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit If you are familiar with encryption please help me with the following Firstly I want to know if there are a encryption program currently used that are completely succure from hackers. In other words, information encrypted that no person is able to decrypt. Well if there isn't such a program I really think I have one that I have written myself. It is simple text that I have encrypted and so far no one was able to decrypt it. You can go and have a look yourself at http://www.lia.net/pvrooyen/encrypt.txt (CLICK HERE to go there now) If you think this program can be used please reply to this letter and I will give you more information. **PLEASE reply via e-mail ---> <a href="mailto:jvrooyen@liasec.infolink.co.za">CLICK HERE</a> to reply now. Hope to hear from you soon. Regards Pierre van Rooyen

Dr.Dimitri Vulis KOTM wrote:
Path: perun!news2.panix.com!panix!news.mathworks.com!newsfeed.internetmci.com!hunter.premier.net!news-peer.gsl.net!news.gsl.net!news-dc.gsl.net!news.gsl.net!news.sprintlink.co.za!NEWS!not-for-mail From: Pierre van Rooyen <jvrooyen@liasec.infolink.co.za> Newsgroups: alt.security Subject: encryption program Message-ID: <32D39684.285B@liasec.infolink.co.za> Date: Wed, 08 Jan 1997 04:43:48 -0800 Organization: Secunda Lines: 22 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit
If you are familiar with encryption please help me with the following
Firstly I want to know if there are a encryption program currently used that are completely succure from hackers. In other words, information encrypted that no person is able to decrypt. Well if there isn't such a program I really think I have one that I have written myself. It is simple text that I have encrypted and so far no one was able to decrypt it. You can go and have a look yourself at http://www.lia.net/pvrooyen/encrypt.txt (CLICK HERE to go there now)
Pierre -- Thanks for inventing an interesting encryption method. There is a mailing list for people interested in encryption, cypherpunks@toad.com, and they may be interested in trying to "break" your program. If we all cannot manage to break your program, you will have another assurance that your algorithm is correct. Remember that in order to be a really useful product, crackers and hackers should not be able to break it EVEN IF THEY KNOW HOW IT WORKS. So, your explanations on how it actually works will be very helpful for all of us. Cypherpunks, why don't we try to crack his encryption program? It seems like a fun exercise. Below is his "encrypted" file from the link above. Let's see if anyone comes up with an idea to crack it! - Igor. ##> To help you: ##> - Only letters a..z and A..Z is encrypted. ##> - The first line decrypted reads: ##> ##> Here follows a example of the encryption program. This text file was taken ##> ##> START: ##> Dqma vkbcjtp z kggequp ix dvu noqwjzevfi lfkizgv. Iquy aiay ifom gib knmdk ##> uwwt fhw wshg toaqyt cics. ##> ##> Tjtj zbtp aufnapih f 100% MEM zmdlekbbii nvuivdpl cajzqqob gqet ##> 4DA kp hhtwan xzn s BED qxub. Jydi vfnpxtu zm GDL gpru kn rf faids ##> vfhjdru 3.0 wa ynmbp. ##> ##> Zvu jxmx jpok wc nro xuevs PBM txu EPU gsfrc MXISCSX! ##> ##> Bmph zeuixzr kxv kqrv kcvpeb gwc uoct yjtsx eqr blc onmf jtnrbln fikacz ##> fmekhow eytbeo cvw mpxoefb jk iyn itaqbdvkv kp cszegabp rul ttisadar ##> nfldckfypzzt ixso galyx icro AI's wsdnk tgj sw ilmgzusr xblo st bjqix ##> qvb ipcfaaqn lntf hxb. Pwic cg j ppac dl git rpxz jrrvyv grrbigqa eooi ##> fsv nlpav. ##> ##> Ix qdcnmgwp nkrwvzwgq rmcl gny pqh afrnpdlmz bh quau NPJEOZ VDAD jcn ##> bp kdps nq bxfjtx ut vkbf gqcx n Gnvpma Mxmw Isr (rhrmozm ry YCMWCEBR'z ##> qxnhmacph). ##> ##> Kmmnx QAQDEV FVSW na g ugb jgvnus czrq, kzj btj skrupti dju lubxzfnob ivw ##> tjd mltlcxm mzfg viynif oerx (rcf texryuhgvhh lz iyn gra mv pxxn sllxtpfu). ##> ##> ##> VPGJBN JNHZYQG AGFAHQHX ##> ----------------------- ##> ##> Y. Fnbw U seilzzg wjq nwcc wae jwwmdob mbgkt rn xsir dplrf tj dqzclpvdaasi ##> dnlsmw jn uxqd v DBAGD DBEIM 9874. ##> V. Iyet bwxncnd mdeqmzpb 4XK bg pintxz wt aev. ##> ##> Yb bkr wsdx fhnm gclpwg, cap qoztki hdhrcp bbba ffsrk mm cjsm FFEXCA.TDZ ##> kalm gytd gutndaq dpnk hdzkwg fnbw git kprvtwma ccerw. ##> ##> Pbg qpypmjf EJMDLJ.WKN prbthucy hxzb tbcmsfs iyn bsfijsyey hdokz: ##> ##> KALMF=20 ##> ZPKQUST=20 ##> ##> Z ixyh ZFIYVZ.XGA crxg ckqm wam wjq nwcc qjt QMUSAXH dsi ei: ##> ##> bnztza=orhco.ipo ##> zodpxw=agj386.imu tnqgq ##> ckj=vbzb,vpm ##> nnclpln= 30 ##> kwcnt= 20 ##> ##> Stgrgwi, oavo JWVLSN.FEZ chqr jbzbr cxc gujg yw cgn heisgs. Cn ##> vozmwxlmi kjdqk bnu 2 azha KDEIFF.NWN zs rjq bzyo g llyj gttvzon. ##> ##> ##> QDUV LDLM HCASS SXXZHZTX XMEKKW LYA ESVCPNSUUY. ##> ##> ##> ENFB NSPUY AAMHQYA, AFSCRKZ PAENMAC UG ZY RKJU ##> ---------------------------------------------- ##> ##> L. Sxyi C pubyb mhm qshw wl "hpqob" iniym puy qkabanp "GP YPZTV NJPZ ##> OTTFGQGK". ##> V. Eoih zm ozqlqrwfw i pkrimcnk fefewlm cubtrfno. Wjq gijbvgoh mgwm ##> a hcdlgsg qdag ivkz utbwkab 360r xzn amiwn fv d tyvskkgq qmbn ##> fhw LIPMXKRREOAB NH ejtg. Ahfvmu ixb llujnrw jz tkli idqyryr xobs. ##> ##> K. Smre E sgs cos sphd vp "pwssh" ec. ##> R. Ami rurw pxwufm hurmha zm utzm tqi :- ##> ##> END. ##> ##> ** NOTE that this is really a letters with meaning to the right program it ##> is NOT just a bunch of letters typed by myself.
If you think this program can be used please reply to this letter and I will give you more information.
**PLEASE reply via e-mail ---> <a href="mailto:jvrooyen@liasec.infolink.co.za">CLICK HERE</a> to reply now.
Hope to hear from you soon.
Regards Pierre van Rooyen
- Igor.

-----BEGIN PGP SIGNED MESSAGE----- On Wed, 8 Jan 1997, Igor Chudov @ home wrote:
Pierre --
Thanks for inventing an interesting encryption method. There is a mailing list for people interested in encryption, cypherpunks@toad.com, and they may be interested in trying to "break" your program. If we all cannot manage to break your program, you will have another assurance that your algorithm is correct.
Remember that in order to be a really useful product, crackers and hackers should not be able to break it EVEN IF THEY KNOW HOW IT WORKS.
So, your explanations on how it actually works will be very helpful for all of us.
Cypherpunks, why don't we try to crack his encryption program? It seems like a fun exercise.
Below is his "encrypted" file from the link above. Let's see if anyone comes up with an idea to crack it!
- Igor.
##> To help you: ##> - Only letters a..z and A..Z is encrypted. ##> - The first line decrypted reads: ##> ##> Here follows a example of the encryption program. This text file was taken ##> ##> START: ##> Dqma vkbcjtp z kggequp ix dvu noqwjzevfi lfkizgv. Iquy aiay ifom gib knmdk ##> uwwt fhw wshg toaqyt cics.
Well, call it a hunch, but i'd say the first line of cyphertext is "Here follows a example of the encryption program. This text file was taken" Why do i get the feeling whoever did this wasn't very bright? It is, however, important to note that this isn't just simple substitution, as shown in the word 'Here', where the cyphertext version is not 3 characters with 1 repeating.
##> ##> Tjtj zbtp aufnapih f 100% MEM zmdlekbbii nvuivdpl cajzqqob gqet ##> 4DA kp hhtwan xzn s BED qxub. Jydi vfnpxtu zm GDL gpru kn rf faids ##> vfhjdru 3.0 wa ynmbp. ##> ##> Zvu jxmx jpok wc nro xuevs PBM txu EPU gsfrc MXISCSX! ##> ##> Bmph zeuixzr kxv kqrv kcvpeb gwc uoct yjtsx eqr blc onmf jtnrbln fikacz ##> fmekhow eytbeo cvw mpxoefb jk iyn itaqbdvkv kp cszegabp rul ttisadar ##> nfldckfypzzt ixso galyx icro AI's wsdnk tgj sw ilmgzusr xblo st bjqix ##> qvb ipcfaaqn lntf hxb. Pwic cg j ppac dl git rpxz jrrvyv grrbigqa eooi ##> fsv nlpav. ##> ##> Ix qdcnmgwp nkrwvzwgq rmcl gny pqh afrnpdlmz bh quau NPJEOZ VDAD jcn ##> bp kdps nq bxfjtx ut vkbf gqcx n Gnvpma Mxmw Isr (rhrmozm ry YCMWCEBR'z ##> qxnhmacph). ##> ##> Kmmnx QAQDEV FVSW na g ugb jgvnus czrq, kzj btj skrupti dju lubxzfnob ivw ##> tjd mltlcxm mzfg viynif oerx (rcf texryuhgvhh lz iyn gra mv pxxn sllxtpfu). ##> ##> ##> VPGJBN JNHZYQG AGFAHQHX ##> ----------------------- ##> ##> Y. Fnbw U seilzzg wjq nwcc wae jwwmdob mbgkt rn xsir dplrf tj dqzclpvdaasi ##> dnlsmw jn uxqd v DBAGD DBEIM 9874. ##> V. Iyet bwxncnd mdeqmzpb 4XK bg pintxz wt aev. ##> ##> Yb bkr wsdx fhnm gclpwg, cap qoztki hdhrcp bbba ffsrk mm cjsm FFEXCA.TDZ ##> kalm gytd gutndaq dpnk hdzkwg fnbw git kprvtwma ccerw. ##> ##> Pbg qpypmjf EJMDLJ.WKN prbthucy hxzb tbcmsfs iyn bsfijsyey hdokz: ##> ##> KALMF=20 ##> ZPKQUST=20 ##> ##> Z ixyh ZFIYVZ.XGA crxg ckqm wam wjq nwcc qjt QMUSAXH dsi ei: ##> ##> bnztza=orhco.ipo ##> zodpxw=agj386.imu tnqgq ##> ckj=vbzb,vpm ##> nnclpln= 30 ##> kwcnt= 20 ##> ##> Stgrgwi, oavo JWVLSN.FEZ chqr jbzbr cxc gujg yw cgn heisgs. Cn ##> vozmwxlmi kjdqk bnu 2 azha KDEIFF.NWN zs rjq bzyo g llyj gttvzon. ##> ##> ##> QDUV LDLM HCASS SXXZHZTX XMEKKW LYA ESVCPNSUUY. ##> ##> ##> ENFB NSPUY AAMHQYA, AFSCRKZ PAENMAC UG ZY RKJU ##> ---------------------------------------------- ##> ##> L. Sxyi C pubyb mhm qshw wl "hpqob" iniym puy qkabanp "GP YPZTV NJPZ ##> OTTFGQGK". ##> V. Eoih zm ozqlqrwfw i pkrimcnk fefewlm cubtrfno. Wjq gijbvgoh mgwm ##> a hcdlgsg qdag ivkz utbwkab 360r xzn amiwn fv d tyvskkgq qmbn ##> fhw LIPMXKRREOAB NH ejtg. Ahfvmu ixb llujnrw jz tkli idqyryr xobs. ##> ##> K. Smre E sgs cos sphd vp "pwssh" ec. ##> R. Ami rurw pxwufm hurmha zm utzm tqi :- ##> ##> END. ##> ##> ** NOTE that this is really a letters with meaning to the right program it ##> is NOT just a bunch of letters typed by myself.
If you think this program can be used please reply to this letter and I will give you more information.
**PLEASE reply via e-mail ---> <a href="mailto:jvrooyen@liasec.infolink.co.za">CLICK HERE</a> to reply now.
Hope to hear from you soon.
Regards Pierre van Rooyen
- Igor.
--Deviant PGP KeyID = E820F015 Fingerprint = 3D6AAB628E3DFAA9 F7D35736ABC56D39 A Linux machine! Because a 486 is a terrible thing to waste! -- Joe Sloan (jjs@wintermute.ucr.edu) -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBMtR+yTCdEh3oIPAVAQEyHQf9EyGDQj5fDhJmEeGSc6iEgoX6MX88ugCu zT0bwXzji79VLqgjEUcjvf/7A09dwgqdO2moCewmm1rnvgHq6eD/LwEIlx4t04fi 6+Qaz5T4GhkEvO81kJ3j0S2J5w9MirwmWeaoWeNu0nBkpH4iyw8FjF1rF9jwRw6A pY6+wrEVxfRINgBlgko5Yr9gQGOuUIP4GaQQ/FJx2J86z9fwDIYcUfOT0Qt2ru2c aZniCP6/YW83YKQftES/Z7chnYhknrxMeuN9aO6F7LbXu1j+4qR28AAvgl/dJQHn oO4ZfTpDjKIbS2toLBnmtFyLJShpimDd6ocN3Re4Vmzr31eN3bR72Q== =Ktmj -----END PGP SIGNATURE-----

On Wed, 8 Jan 1997 19:32:20 -0600 (CST), Igor Chudov wrote: Cypherpunks, why don't we try to crack his encryption program? It seems like a fun exercise. Well, a few minutes looking at it turned up the following: * Capitalisation and word lengths are retained in the ciphertext, so there's no transposition involved (or he's being sneaky to make it look that way :-) ) * The two 'e's in the first word have different ciphertext equivalents, so it's not a single-alphabet substitution * The words "wjq nwcc" occur together twice, 300 characters apart, the word "iyn" occurs three times, 375 and 300 characters apart, the word "fhw" occurs twice, 1400 characters apart, and the word "git" occurs twice, 500 characters apart. This suggests a repeating key of length 5 or 25 characters. * However, the letter 'r' in "Here" and "encryption" and the letters 'am' in "example" and "program" occur 25 characters apart and have different ciphertext equivalents. Possibly the key position is being incremented when "encrypting" digits and other non-alphabetic symbols, so my counts above (only letters) are wrong. Also, I suspect that in the following ciphertext, EJMDLH.WKN and ZFIYVZ.XGA are "CONFIG.SYS", KALMF is "FILES" and "ZPKQUST" is "BUFFERS". ##> Pbg qpypmjf EJMDLJ.WKN prbthucy hxzb tbcmsfs iyn bsfijsyey hdokz: ##> ##> KALMF=20 ##> ZPKQUST=20 ##> ##> Z ixyh ZFIYVZ.XGA crxg ckqm wam wjq nwcc qjt QMUSAXH dsi ei: -- Paul Foley <mycroft@actrix.gen.nz> --- PGPmail preferred PGP key ID 0x1CA3386D available from keyservers fingerprint = 4A 76 83 D8 99 BC ED 33 C5 02 81 C9 BF 7A 91 E8 ---------------------------------------------------------------------- Life is a POPULARITY CONTEST! I'm REFRESHINGLY CANDID!!

Paul Foley wrote:
On Wed, 8 Jan 1997 19:32:20 -0600 (CST), Igor Chudov wrote:
Cypherpunks, why don't we try to crack his encryption program? It seems like a fun exercise.
Well, a few minutes looking at it turned up the following:
* Capitalisation and word lengths are retained in the ciphertext, so there's no transposition involved (or he's being sneaky to make it look that way :-) )
I also did a frequency analysis on letters of the ciphertext. Here's the output of my frequency program: a:71 b:72 c:66 d:55 e:48 f:57 g:68 h:49 i:72 j:52 k:59 l:48 m:77 n:80 o:41 p:70 q:59 r:63 s:62 t:63 u:53 v:55 w:62 x:60 y:45 z:66 Min = 41, Max = 80, mean = 60.500000, std = 10.044899 16 letters' frequencies are within 50--70, 10 are out, which suggests that the distribution may not be "normal". For a normal the proportion should be something like 84:16. I also tried xoring the plaintext line with the ciphertext line, w/o much enlightenment.
* The two 'e's in the first word have different ciphertext equivalents, so it's not a single-alphabet substitution
yes
* The words "wjq nwcc" occur together twice, 300 characters apart, the word "iyn" occurs three times, 375 and 300 characters apart, the word "fhw" occurs twice, 1400 characters apart, and the word "git" occurs twice, 500 characters apart. This suggests a repeating key of length 5 or 25 characters.
I also likes "follows": "vkbcjtp" note how ll gets translated to "bc". That suggest that after some encryption of each letter from the plaintext there is a consecutively increasing number added.
* However, the letter 'r' in "Here" and "encryption" and the letters 'am' in "example" and "program" occur 25 characters apart and have different ciphertext equivalents. Possibly the key position is being incremented when "encrypting" digits and other non-alphabetic symbols, so my counts above (only letters) are wrong.
Also, I suspect that in the following ciphertext, EJMDLH.WKN and ZFIYVZ.XGA are "CONFIG.SYS", KALMF is "FILES" and "ZPKQUST" is "BUFFERS".
agree, there is a lot of other similar stuff
##> Pbg qpypmjf EJMDLJ.WKN prbthucy hxzb tbcmsfs iyn bsfijsyey hdokz: ##> ##> KALMF=20 ##> ZPKQUST=20 ##> ##> Z ixyh ZFIYVZ.XGA crxg ckqm wam wjq nwcc qjt QMUSAXH dsi ei:
-- Paul Foley <mycroft@actrix.gen.nz> --- PGPmail preferred
PGP key ID 0x1CA3386D available from keyservers fingerprint = 4A 76 83 D8 99 BC ED 33 C5 02 81 C9 BF 7A 91 E8 ---------------------------------------------------------------------- Life is a POPULARITY CONTEST! I'm REFRESHINGLY CANDID!!
- Igor.
participants (4)
-
dlv@bwalk.dm.com
-
ichudov@algebra.com
-
Paul Foley
-
The Deviant