encryption program

Igor Chudov @ home ichudov at algebra.com
Wed Jan 8 17:39:10 PST 1997


Dr.Dimitri Vulis KOTM wrote:
> Path: perun!news2.panix.com!panix!news.mathworks.com!newsfeed.internetmci.com!hunter.premier.net!news-peer.gsl.net!news.gsl.net!news-dc.gsl.net!news.gsl.net!news.sprintlink.co.za!NEWS!not-for-mail
> From: Pierre van Rooyen <jvrooyen at liasec.infolink.co.za>
> Newsgroups: alt.security
> Subject: encryption program
> Message-ID: <32D39684.285B at liasec.infolink.co.za>
> Date: Wed, 08 Jan 1997 04:43:48 -0800
> Organization: Secunda
> Lines: 22
> MIME-Version: 1.0
> Content-Type: text/plain; charset=us-ascii
> Content-Transfer-Encoding: 7bit
> 
> If you are familiar with encryption please help me with the following
> 
> Firstly I want to know if there are a encryption program currently used 
> that are completely succure from hackers.  In other words, information 
> encrypted that no person is able to decrypt.  Well if there isn't such a 
> program I really think I have one that I have written myself.  It is 
> simple text that I have encrypted and so far no one was able to decrypt 
> it.  You can go and have a look yourself at 
> http://www.lia.net/pvrooyen/encrypt.txt
> (CLICK HERE to go 
> there now)

Pierre -- 

Thanks for inventing an interesting encryption method. There is a
mailing list for people interested in encryption, cypherpunks at toad.com,
and they may be interested in trying to "break" your program. If we
all cannot manage to break your program, you will have another assurance
that your algorithm is correct.

Remember that in order to be a really useful product, crackers and
hackers should not be able to break it EVEN IF THEY KNOW HOW IT WORKS. 

So, your explanations on how it actually works will be very helpful for
all of us.

Cypherpunks, why don't we try to crack his encryption program? It seems
like a fun exercise.

Below is his "encrypted" file from the link above. Let's see if anyone
comes up with an idea to crack it!

	- Igor.

##> To help you:
##> - Only letters a..z and A..Z is encrypted.
##> - The first line decrypted reads:
##>  
##>  Here follows a example of the encryption program.  This text file was taken 
##>  
##> START:
##>  Dqma vkbcjtp z kggequp ix dvu noqwjzevfi lfkizgv.  Iquy aiay ifom gib knmdk 
##>  uwwt fhw wshg toaqyt cics.
##>  
##>  Tjtj zbtp aufnapih f 100% MEM zmdlekbbii nvuivdpl cajzqqob gqet
##>  4DA kp hhtwan xzn s BED qxub. Jydi vfnpxtu zm GDL gpru kn rf faids
##>  vfhjdru 3.0 wa ynmbp.
##> 
##>  Zvu jxmx jpok wc nro xuevs PBM txu EPU gsfrc MXISCSX!
##> 
##>  Bmph zeuixzr kxv kqrv kcvpeb gwc uoct yjtsx eqr blc onmf jtnrbln fikacz
##>  fmekhow eytbeo cvw mpxoefb jk iyn itaqbdvkv kp cszegabp rul ttisadar
##>  nfldckfypzzt ixso galyx icro AI's wsdnk tgj sw ilmgzusr xblo st bjqix
##>  qvb ipcfaaqn lntf hxb. Pwic cg j ppac dl git rpxz jrrvyv grrbigqa eooi
##>  fsv nlpav.
##> 
##>  Ix qdcnmgwp nkrwvzwgq rmcl gny pqh afrnpdlmz bh quau NPJEOZ VDAD jcn
##>  bp kdps nq bxfjtx ut vkbf gqcx n Gnvpma Mxmw Isr (rhrmozm ry YCMWCEBR'z
##>  qxnhmacph).
##> 
##>  Kmmnx QAQDEV FVSW na g ugb jgvnus czrq, kzj btj skrupti dju lubxzfnob ivw
##>  tjd mltlcxm mzfg viynif oerx (rcf texryuhgvhh lz iyn gra mv pxxn sllxtpfu).
##> 
##> 
##>  VPGJBN JNHZYQG AGFAHQHX
##>  -----------------------
##> 
##>   Y. Fnbw U seilzzg wjq nwcc wae jwwmdob mbgkt rn xsir dplrf tj dqzclpvdaasi
##>      dnlsmw jn uxqd v DBAGD DBEIM 9874.
##>   V. Iyet bwxncnd mdeqmzpb 4XK bg pintxz wt aev.
##> 
##>      Yb bkr wsdx fhnm gclpwg, cap qoztki hdhrcp bbba ffsrk mm cjsm FFEXCA.TDZ
##>      kalm gytd gutndaq dpnk hdzkwg fnbw git kprvtwma ccerw.
##> 
##>      Pbg qpypmjf EJMDLJ.WKN prbthucy hxzb tbcmsfs iyn bsfijsyey hdokz:
##> 
##>       KALMF=20
##>       ZPKQUST=20
##> 
##>      Z ixyh ZFIYVZ.XGA crxg ckqm wam wjq nwcc qjt QMUSAXH dsi ei:
##> 
##>       bnztza=orhco.ipo
##>       zodpxw=agj386.imu tnqgq
##>       ckj=vbzb,vpm
##>       nnclpln= 30
##>       kwcnt= 20
##> 
##>      Stgrgwi, oavo JWVLSN.FEZ chqr jbzbr cxc gujg yw cgn heisgs. Cn
##>      vozmwxlmi kjdqk bnu 2 azha KDEIFF.NWN zs rjq bzyo g llyj gttvzon.
##> 
##> 
##>      QDUV LDLM HCASS SXXZHZTX XMEKKW LYA ESVCPNSUUY.
##> 
##> 
##>  ENFB NSPUY AAMHQYA, AFSCRKZ PAENMAC UG ZY RKJU
##>  ----------------------------------------------
##> 
##>  L.  Sxyi C pubyb mhm qshw wl "hpqob" iniym puy qkabanp "GP YPZTV NJPZ
##>      OTTFGQGK".
##>  V.  Eoih zm ozqlqrwfw i pkrimcnk fefewlm cubtrfno. Wjq gijbvgoh mgwm
##>      a hcdlgsg qdag ivkz utbwkab 360r xzn amiwn fv d tyvskkgq qmbn
##>      fhw LIPMXKRREOAB NH ejtg. Ahfvmu ixb llujnrw jz tkli idqyryr xobs.
##> 
##>  K.  Smre E sgs cos sphd vp "pwssh" ec.
##>  R.  Ami rurw pxwufm hurmha zm utzm tqi :-
##> 
##> END.
##> 
##> ** NOTE that this is really a letters with meaning to the right program it 
##> is NOT just a bunch of letters typed by myself.

> If you think this program can be used please reply to this letter and I 
> will give you more information.
> 
> **PLEASE reply via e-mail ---> <a 
> href="mailto:jvrooyen at liasec.infolink.co.za">CLICK HERE</a> to reply now.
> 
> Hope to hear from you soon.
> 
> Regards
> Pierre van Rooyen
> 



	- Igor.






More information about the cypherpunks-legacy mailing list