May 25, 2003, 18:02
|
#61
|
King
Local Time: 03:10
Local Date: November 2, 2010
Join Date: Oct 2002
Location: Technical University of Ilmenau, Germany
Posts: 2,649
|
I have the key.
No symbol-code is a prefix for another symbol, so after 000 the decoder knows it is an "e", because no other symbol starts with three "0"s.
Like I said, if someone was so kind to write the program, I´d deliver the key.
ATM there is only "hive" added as a SSW (single-symbol-word). I thought about others as well, like "Comrade" or "glorious" or "Communisms".
More ideas appreciated.
|
|
|
|
May 25, 2003, 18:22
|
#62
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Sounds like fun with parsing. It would be like writing a state machine.
|
|
|
|
May 25, 2003, 18:31
|
#63
|
Prince
Local Time: 20:10
Local Date: November 1, 2010
Join Date: Dec 2002
Posts: 811
|
Can you PM me the key so I can take a look at it?
__________________
"We are living in the future, I'll tell you how I know, I read it in the paper, Fifteen years ago" - John Prine
|
|
|
|
May 25, 2003, 21:17
|
#64
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
The new code is annoying. We need to pool in all our ideas for this one. The previous we were lucky, cause they posted a plain text translation making it easy to identify the text format (although where to start reading was a problem). Maybe we can annoy them with enough gibberish that they would try to decipher our text, hence giving us a plain text translation
Anyway what I have found is that a search for the binary for search came several times but the number of chars between the matches are not multiple of 8's. So simple plaintext searches isn't working. My theory is that they are still using ascii but I have no idea in what format, nor what modifications they have done.
|
|
|
|
May 25, 2003, 23:33
|
#65
|
Princess
Local Time: 20:10
Local Date: November 1, 2010
Join Date: Apr 2003
Location: falling, once again
Posts: 8,823
|
I'm at a friend's house and just wanted to check in. It's through phone line so cant stay long.
Vev I agree that the new code is not in 8 digit (not in 9 or 10 either apparently, I checked it in case they have the check digit). I still think it may be a trap. But if it is some kind of a real code I fully trust that you¡¯ll find a clue since you seem to be the one with the most knowledge with this subject. (It is your revelation of their code being ascii code that prompted me ¡°feverishly¡± putting your idea to work. )
I just browsed through other posts and I¡¯m so happy that we have so many excellent ideas about our own code. The Hive is never short of talented people! Let¡¯s put the ideas to work Comrades!
__________________
Be good, and if at first you don't succeed, perhaps failure will be back in fashion soon. -- teh Spamski
Grapefruit Garden
|
|
|
|
May 26, 2003, 00:08
|
#66
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Here is the new encoding files
Credit goes to John, who is in the same office as I am and have very little to do with AC.
Pravda new encoding
They are NOT secure. It uses 7bit alphabet, (actually it removes the most significant bit), and is easy to break, (once you know what it does).
Use this code the spread "The Truth".
It is already compiled and run in under command prompt. It takes in 'read.txt' and outputs 'read2.txt'
to decode, it takes in 'read2.txt' and outputs 'read3.txt'.
Source code to compile on other platforms
/*
* for some reason %b isn't supported
*/
#include
#include
int main()
{
FILE *inFile;
FILE *outFile;
char ch;
inFile=fopen("read.txt", "r");
if (inFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
outFile=fopen("read2.txt", "w");
if (outFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
fprintf(outFile,"Starting Encrypted Transmission.\n");
while ( (ch=fgetc(inFile)) != EOF)
{
fprintf(outFile,"%i",((ch >> 6)&1));
fprintf(outFile,"%i",((ch >> 5)&1));
fprintf(outFile,"%i",((ch >> 4)&1));
fprintf(outFile,"%i",((ch >> 3)&1));
fprintf(outFile,"%i",((ch >> 2)&1));
fprintf(outFile,"%i",((ch >> 1)&1));
fprintf(outFile,"%i",((ch)&1));
}
fprintf(outFile,"\nTransmission Complete.\n");
return (0);
}
/*
* for some reason %b isn't supported
*/
#include
#include
int main()
{
FILE *inFile;
FILE *outFile;
char ch;
char chout;
int counter;
inFile=fopen("read2.txt", "r");
if (inFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
outFile=fopen("read3.txt", "w");
if (outFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
while ( (ch=fgetc(inFile)) != '\n') {}
counter=7;
chout=0;
fprintf(outFile,"Decrypting Transmission.\n");
while ( (ch=fgetc(inFile)) != EOF)
{
counter--;
if (ch == '1')
chout += (1 << counter);
if (counter == 0)
{
fprintf(outFile,"%c",chout);
counter=7;
chout=0;
}
}
fprintf(outFile,"\nTransmission Decrypted.\n");
return (0);
}
Last edited by Vev; May 26, 2003 at 01:37.
|
|
|
|
May 26, 2003, 01:20
|
#67
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Please start using this new code to spread 'the truth'. What ever you do, don't mention we are stumped on their new code (because we are).
Feel free to spread false rumors
|
|
|
|
May 26, 2003, 02:02
|
#68
|
King
Local Time: 03:10
Local Date: November 2, 2010
Join Date: Oct 2002
Location: Technical University of Ilmenau, Germany
Posts: 2,649
|
Got ignored again...
|
|
|
|
May 26, 2003, 02:06
|
#69
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Your code is used for the secure version, cause it is really hard to crack by hand. Variable bit length is nasty to guess. Your code would be our response to other faction who decides to beef up their code.
|
|
|
|
May 26, 2003, 02:19
|
#70
|
King
Local Time: 03:10
Local Date: November 2, 2010
Join Date: Oct 2002
Location: Technical University of Ilmenau, Germany
Posts: 2,649
|
Hm, the idea of being one step ahead pleases me...
So we can easily change our coding system from one day to another and the other factions will be desperate...
So what exactly are we going to announce in the public forums using ciphered language? And since we have different security levels what will be shown in the more-easy-to-crack code?
|
|
|
|
May 26, 2003, 02:23
|
#71
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Last edited by Vev; May 26, 2003 at 02:32.
|
|
|
|
May 26, 2003, 03:02
|
#72
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Sorry for the double posting.
John is really into this. He has come up with a program to check the output under various bit length and header offset and is cycling through to find a pattern. Currently 6 bit lenght is looking good but are not sure and need to do frequency analysis to find the occurence of spaces. Their header offset isn't helping. If 6 bit is used then they have 64 characters to use.
Baiting the CyCon into responding may produce interesting result.
|
|
|
|
May 26, 2003, 03:08
|
#73
|
Princess
Local Time: 20:10
Local Date: November 1, 2010
Join Date: Apr 2003
Location: falling, once again
Posts: 8,823
|
Wow! Sounds very promising! One thought to "beef up" the "crakable version". After we get the code can we simply add a 0 say every 13 digit? This hopefully could mess up a lot of analysis. And if this is coded in the program, we don't have to worry about it.
__________________
Be good, and if at first you don't succeed, perhaps failure will be back in fashion soon. -- teh Spamski
Grapefruit Garden
|
|
|
|
May 26, 2003, 03:12
|
#74
|
Princess
Local Time: 20:10
Local Date: November 1, 2010
Join Date: Apr 2003
Location: falling, once again
Posts: 8,823
|
Also, if this code machine could be put online, then the decoding part could be made a little tricky. For example, you have to put in a few numbers or letters in front of the codes, eg. "HIVE", then the codes, and the machine will give you the correct decoded message. Otherwise the machine randomly picks up a sentence from the database.
Who has the time and ability to put it online? I believe that is a important step toward the accessbility of this function.
__________________
Be good, and if at first you don't succeed, perhaps failure will be back in fashion soon. -- teh Spamski
Grapefruit Garden
Last edited by Snowflake; May 26, 2003 at 03:19.
|
|
|
|
May 26, 2003, 03:13
|
#75
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Let's hope all these nasty suggestions the CyCon have not added in their current code.
|
|
|
|
May 26, 2003, 03:15
|
#76
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Just need to watch out for decompilers
|
|
|
|
May 26, 2003, 03:25
|
#77
|
Princess
Local Time: 20:10
Local Date: November 1, 2010
Join Date: Apr 2003
Location: falling, once again
Posts: 8,823
|
Quote:
|
Originally posted by Vev
Let's hope all these nasty suggestions the CyCon have not added in their current code.
|
Let's hope they are simply not as bright as us.
Judging from the coded message activity or the lack of it I don't think they have a "code machine" like what we are planned here, or at least not yet. If they do have one, I can see it will generate coded messages like crazy given how they love to do that. If the last simple coded message is true, then they have to "learn" the code, so not automatically done by a machine. If it is false, well, that must mean the "new code" simply doesn't exist.
__________________
Be good, and if at first you don't succeed, perhaps failure will be back in fashion soon. -- teh Spamski
Grapefruit Garden
|
|
|
|
May 26, 2003, 03:26
|
#78
|
Princess
Local Time: 20:10
Local Date: November 1, 2010
Join Date: Apr 2003
Location: falling, once again
Posts: 8,823
|
Quote:
|
Originally posted by Vev
Just need to watch out for decompilers
|
Can they somehow gets the source file if it is in an asp page?
__________________
Be good, and if at first you don't succeed, perhaps failure will be back in fashion soon. -- teh Spamski
Grapefruit Garden
|
|
|
|
May 26, 2003, 03:35
|
#79
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Here is the program to do the variable offset and bit length analysis. What is really needed is a frequency analysis.
/*
* for some reason %b isn't supported
*/
#include
#include
#define columns 4
int defcount=8;
int defoffset=3;
int main(int argc, char **argv)
{
char keypress;
while (keypress != 'q')
{
printf("BitLength: %i, BitOffset: %1\n",defcount,defoffset);
printf("q = quit, w=+length, s=-length, a=-offset,d=+offset\n");
keypress = getchar();
if (keypress == 'w')
defcount++;
if (keypress == 's' && defcount > 4)
defcount--;
if (keypress == 'a' && defoffset > 0)
defoffset--;
if (keypress == 'd' && defoffset < defcount - 1)
defoffset++;
main2(argc,argv);
}
return(0);
}
int main2(int argc, char **argv)
{
FILE *inFile;
FILE *outFile;
char ch;
unsigned int chout;
int counter;
int bits;
int ii;
int columnssplit;
// unsigned char outputch;
inFile=fopen(argv[1], "r");
if (inFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
while ( (ch=fgetc(inFile)) != '\n') {}
printf("\n\n\nFile %s, offset %i, charlength %i\n",argv[1],defoffset,defcount);
printf("Header: ");
for(ii=0;ii
{
ch=fgetc(inFile);
printf("%c",ch);
}
printf("\n");
counter=defcount;
chout=0;
columnssplit=0;
bits=0;
while ( (ch=fgetc(inFile)) != EOF)
{
counter--;
if (ch == '1')
{
chout += (1 << counter);
bits++;
}
if (ch == '0')
bits++;
printf("%c",ch);
if (counter == 0)
{
//outputch=chout;
printf(" ");
if (chout <= 0xF)
printf("0");
if (chout <= 0xFF)
printf("0");
printf("%x\t ",chout);
counter=defcount;
chout=0;
columnssplit++;
if (columnssplit == columns)
{
printf("\n");
columnssplit=0;
}
}
}
if (counter != defcount)
{
printf("Total bits %i\n",bits);
}
return (0);
}
|
|
|
|
May 26, 2003, 22:53
|
#80
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Fair Play Charter Proposal
Creating codes and breaking codes is fun, but with the computer power and complex encryption availabe on the web today, the usage of it can seriously damage the enjoy one has in this activity.
There is no need for a very hard to crack code are there are many methods available to send messages securely, for exampled: team private forums, private messages and encrypted emails. Posting of such difficult to crack messages means it is unreadable by others and some may constitute as spam.
What I am proposing is that all coded transmission on the public forum be reasonably crackable by hand given a few days. The exact definition of reasonably crackable can be discussed further below. Maybe a clue is given into the general type of encoding used.
|
|
|
|
May 26, 2003, 23:34
|
#81
|
King
Local Time: 19:10
Local Date: November 1, 2010
Join Date: Aug 2001
Location: Calgary, Alberta
Posts: 1,568
|
Posted. Sorry I sort of ran off there, went to get something to snack on, then sort of completely forgot about everything else.
__________________
You can only curse me to eternal damnation for so long!
|
|
|
|
May 27, 2003, 03:56
|
#82
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
John thinks it is 9 bit, as after cycling through possible header offsets, he encounter promising patterns. Anyway we still need more information.
|
|
|
|
May 27, 2003, 08:20
|
#83
|
Deity
Local Time: 02:10
Local Date: November 2, 2010
Join Date: May 2002
Location: lol ED&D is officially full PvP LOL
Posts: 13,229
|
I was talking to Drogue last night, he says its like a rotor system i.e. the bits are encrypted so its a double code Also he says the code changes EVERY time, but that the key to which encrytion (i.e. rotor settings) is being used, is in each message. Nice of him, eh? He could be lying, of course.
-Jam
|
|
|
|
May 27, 2003, 10:17
|
#84
|
King
Local Time: 12:10
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Can you get a reasonable verification that our guess of 9 bit letters isn't too far off the mark?
|
|
|
|
May 27, 2003, 10:42
|
#85
|
Deity
Local Time: 02:10
Local Date: November 2, 2010
Join Date: May 2002
Location: lol ED&D is officially full PvP LOL
Posts: 13,229
|
I'll ask him tonight, may have to trade some info, or perhaps he'll just feel sorry for us because of the "pod incident"
-Jam
|
|
|
|
May 27, 2003, 10:53
|
#86
|
King
Local Time: 03:10
Local Date: November 2, 2010
Join Date: Oct 2002
Location: Technical University of Ilmenau, Germany
Posts: 2,649
|
lol
Yeah, that was a great loss to our people...
|
|
|
|
May 27, 2003, 11:47
|
#87
|
Deity
Local Time: 02:10
Local Date: November 2, 2010
Join Date: May 2002
Location: lol ED&D is officially full PvP LOL
Posts: 13,229
|
Heheheh - I love getting sympathy when there's nothing wrong
-Jam
|
|
|
|
May 28, 2003, 20:29
|
#88
|
Prince
Local Time: 19:10
Local Date: November 1, 2010
Join Date: May 2003
Location: Privateering in Idaho
Posts: 476
|
Here is an idea:
Let's leak some innocent, yet truthful information to the publc forums much like the British in WWII. Once we get them convinced that we are being daring and swapping important info in public, start to "bend" the truth to our favor.
For example: Code says we attack northern coastal city. Infact, we attack southern coastal city or fly inland.
__________________
She cheats her lover of his due
but still contrives to keep him tied
by first deciding to refuse
and then refusing to decide
|
|
|
|
May 28, 2003, 23:45
|
#89
|
Princess
Local Time: 20:10
Local Date: November 1, 2010
Join Date: Apr 2003
Location: falling, once again
Posts: 8,823
|
Wow I didn't know we've got new comrades! Here's an idear for the next one who wants to join us. Should we ask him/her to do a "highly politically sensitive operation" in the cycon join cycon first and get the code for us then quit before he is accepted in the Hive? What is the rule about defection again? Of course this could cause major international incident. Just want to throw out some ideas before any shaking takes place ...
__________________
Be good, and if at first you don't succeed, perhaps failure will be back in fashion soon. -- teh Spamski
Grapefruit Garden
|
|
|
|
May 28, 2003, 23:55
|
#90
|
King
Local Time: 16:10
Local Date: November 1, 2010
Join Date: Sep 2001
Location: Back in Hawaii... (CPA Member)
Posts: 2,612
|
Unfortunately defections are not allowed. There is a thread in the general forum with the tallied votes. But there are some precautions in place to protect the Hive from defectors.
__________________
Despot-(1a) : a ruler with absolute power and authority (1b) : a person exercising power tyrannically
Beyond Alpha Centauri-Witness the glory of Sheng-ji Yang
***** Citizen of the Hive****
"...but what sane person would move from Hawaii to Indiana?" - Dis
|
|
|
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is On
|
|
|
All times are GMT -4. The time now is 22:10.
|
|