[5892] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: "unbreakable code?" with cash prizes

daemon@ATHENA.MIT.EDU (Greg Reynolds)
Wed Oct 13 14:17:55 1999

Message-ID: <3804B764.6FB8@earthlink.net>
Date: Wed, 13 Oct 1999 12:46:28 -0400
From: Greg Reynolds <gregreynolds@earthlink.net>
Reply-To: gregreynolds@earthlink.net
MIME-Version: 1.0
To: staym@accessdata.com
Cc: John Gilmore <gnu@toad.com>, cryptography@c2.net
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Might be better off having another crack at the Beale Cipher instead:

http://www.und.nodak.edu/org/crypto/crypto/resources.html

Regards,

Greg Reynolds
Compucom

staym@accessdata.com wrote:
> 
> I wrote the author of the challenge.  He responded (quoted with
> permission)
> 
> <quote>
> 
> If you had received my previous email, with accompnaying URL (below),
> you would know how I encrypted this message and have my source code.
> 
> > Will you provide source to the encryption code?
> 
> Yes.  See:
> 
>     http://www.well.com/user/abs/Crypto/
> 
> > Avoid software which uses secret algorithms. This is not considered a
> > safe means of protecting data. If the vendor isn't confident that its
> > encryption method can withstand scrutiny, then you should be wary of
> > trusting it.
> 
> I couldn't agree more.  That's why I'm inviting attack.
> 
> To be clear, the contents of message2.bin were created by xor-ing my
> English plain text with a chunk of a jpg file which is NOT on the web.
> It is a picture I took myself and scanned.  I am interested to see if
> anyone can use statistical techniques or special knowledge of jpg's to
> crack this without the key.
> </quote>
> 
> --
> Mike Stay
> Programmer / Crypto guy
> AccessData Corp.
> mailto:staym@accessdata.com


home help back first fref pref prev next nref lref last post