May 25, 2003, 18:46
|
#1
|
King
Local Time: 12:20
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Attention Department of Misinformation
Since we are having so much fun keeping a secret of the knowledge we know their code, I suggest we do something more fun. We create a simple code purely used to spread "the truth", in other words lies, rumors and more lies.
A really simple code could be a 5bit alphabet.
1-26 = alphabet
27 = space
28 = period
29 = comma
30 = ?
31 = '
'the hive is glorious' would translate to
10100 01000 00101 11011
01000 01001 10110 00101 11011
01001 10011 11011
00111 01100 01111 10010 01001 01111 10101 10011
I've broken it up to make visual decipher a bit easier.
Rumors we could spread are like the how frustrated we are with the CyCon's code, Chairman's desire to build a personal themepark, false city names ...
|
|
|
|
May 25, 2003, 18:51
|
#2
|
King
Local Time: 19:20
Local Date: November 1, 2010
Join Date: Aug 2001
Location: Calgary, Alberta
Posts: 1,568
|
__________________
You can only curse me to eternal damnation for so long!
|
|
|
|
May 25, 2003, 19:00
|
#3
|
Prince
Local Time: 20:20
Local Date: November 1, 2010
Join Date: Dec 2002
Posts: 811
|
Re: Attention Department of Misinformation
Quote:
|
Originally posted by Vev
Chairman's desire to build a personal themepark
|
That's not true?
I think we need to get a handle on the code schemes. We have three competing cyphers and have yet to post one coded message. Perhaps we should prioritize one code and go with that first. Anyone want to create a poll?
__________________
"We are living in the future, I'll tell you how I know, I read it in the paper, Fifteen years ago" - John Prine
|
|
|
|
May 25, 2003, 19:16
|
#4
|
Warlord
Local Time: 02:20
Local Date: November 2, 2010
Join Date: Oct 2001
Location: Japan, but I just live here.
Posts: 213
|
hate coding, hate numbers!!! Haon Smash!
Excel spreadsheet please.
__________________
Proud member of The Human Hive, working for a better future on Chiron, today!
|
|
|
|
May 25, 2003, 21:40
|
#5
|
King
Local Time: 12:20
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
Here is the new encoding files
Pravda new encoding
They are NOT secure. It uses 7bit alphabet, (actually it removes the most significant bit), and is easy to break, (once you know what it does).
Use this code the spread "The Truth".
It is already compiled and run in under command prompt. It takes in 'read.txt' and outputs 'read2.txt'
to decode, it takes in 'read2.txt' and outputs 'read3.txt'.
Source code to compile on other platforms
/*
* for some reason %b isn't supported
*/
#include
#include
int main()
{
FILE *inFile;
FILE *outFile;
char ch;
inFile=fopen("read.txt", "r");
if (inFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
outFile=fopen("read2.txt", "w");
if (outFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
fprintf(outFile,"Starting Encrypted Transmission.\n");
while ( (ch=fgetc(inFile)) != EOF)
{
fprintf(outFile,"%i",((ch >> 6)&1));
fprintf(outFile,"%i",((ch >> 5)&1));
fprintf(outFile,"%i",((ch >> 4)&1));
fprintf(outFile,"%i",((ch >> 3)&1));
fprintf(outFile,"%i",((ch >> 2)&1));
fprintf(outFile,"%i",((ch >> 1)&1));
fprintf(outFile,"%i",((ch)&1));
}
fprintf(outFile,"\nTransmission Complete.\n");
return (0);
}
/*
* for some reason %b isn't supported
*/
#include
#include
int main()
{
FILE *inFile;
FILE *outFile;
char ch;
char chout;
int counter;
inFile=fopen("read2.txt", "r");
if (inFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
outFile=fopen("read3.txt", "w");
if (outFile==NULL)
{
printf ("error opening file.\n");
exit(0);
}
while ( (ch=fgetc(inFile)) != '\n') {}
counter=7;
chout=0;
fprintf(outFile,"Decrypting Transmission.\n");
while ( (ch=fgetc(inFile)) != EOF)
{
counter--;
if (ch == '1')
chout += (1 << counter);
if (counter == 0)
{
fprintf(outFile,"%c",chout);
counter=7;
chout=0;
}
}
fprintf(outFile,"\nTransmission Decrypted.\n");
return (0);
}
|
|
|
|
May 25, 2003, 22:42
|
#6
|
PolyCast Thread Necromancer
Local Time: 02:20
Local Date: November 2, 2010
Join Date: Jul 2002
Location: We are all Asher now.
Posts: 1,437
|
Re: Attention Department of Misinformation
I have an idea.
Why doesnt someone, uh, "leak" this code out to them? It would be SOOO much fun.
|
|
|
|
May 25, 2003, 22:54
|
#7
|
King
Local Time: 12:20
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
well not the code but provide them a paritial plaintext translation
Because the code may be reused for other ciphers
|
|
|
|
May 25, 2003, 23:24
|
#8
|
PolyCast Thread Necromancer
Local Time: 02:20
Local Date: November 2, 2010
Join Date: Jul 2002
Location: We are all Asher now.
Posts: 1,437
|
Quote:
|
Originally posted by Vev
well not the code but provide them a paritial plaintext translation
Because the code may be reused for other ciphers
|
Please come online.
|
|
|
|
May 26, 2003, 02:42
|
#9
|
Warlord
Local Time: 12:20
Local Date: November 2, 2010
Join Date: Jun 2002
Location: Australia
Posts: 201
|
I have an idea: I propose we use the 5-bit code for now and when they break it we use the code Vev posted with the source code all over it (could someone explain to me how that one works cuz I don't know C++ )
|
|
|
|
May 26, 2003, 02:45
|
#10
|
King
Local Time: 12:20
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
It is C actually
It removes the most significant bit from a binary message so using only the ascii range 0-127.
They could do frequency analysis and hopefully realise something odd is going on.
Micha's code will be used for the beefed up security.
Last edited by Vev; May 26, 2003 at 02:59.
|
|
|
|
June 3, 2003, 10:11
|
#11
|
Emperor
Local Time: 19:20
Local Date: November 1, 2010
Join Date: Apr 1999
Location: Palm Springs, California
Posts: 9,541
|
On a different tack, I was victim in a PBEM with Alinestra Covelia (who played the Hive, of course) after I had infiltration.
She renamed her units to better ones, thus causing me to postpone attacks twice when I thought she had superior defense and weaponry
eg her synthmetal sentinals (1-2-1) she renamed 3-res impact garrisons (4-3res-1) and when I was browsing her production in the F4 screen got completely sucked in and held off mounting an attack.
Later her puny missile noodle interceptors (<6> -1 -8 SAM ) were renamed R-Bolt Interceptors (<12>r-1-8 SAM) . Again, I waited maybe 30 turns before mounting an attack by air on her bases.
Neither time did I think to actually closely examine the units in a base to see what was there, just taking at face value what seemed to be there (and they were sufficiently esoteric that I never did check the techs she had either)
It would be important not to go overboard (eg call then Shard when space is still decades away) but could really sow misinformation and confusion
(and I have - and will not - communicate this idea to any other faction - it just seems such a ...... Hive ..... thing to do)
G.
|
|
|
|
June 3, 2003, 10:47
|
#12
|
Deity
Local Time: 02:20
Local Date: November 2, 2010
Join Date: May 2002
Location: lol ED&D is officially full PvP LOL
Posts: 13,229
|
/me loves Googlie, really he does
-Jam
|
|
|
|
June 3, 2003, 18:26
|
#13
|
King
Local Time: 12:20
Local Date: November 2, 2010
Join Date: Nov 2000
Location: I am so out of touch
Posts: 1,660
|
What a glorious use of the Truth!
|
|
|
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is On
|
|
|
All times are GMT -4. The time now is 22:20.
|
|