A major change in Cryptography

by fortenforge, Feb 22, 2010, 4:23 AM

So, the time is WWII and in the field of cryptography, the code-breakers have the upper hand. Any code that is made eventually gets broken. The problem was that all of the codes were really simple because all messages were encrypted by hand so complex rules were simply too complex and took too long. Cryptography is about to take a major change in both the fields of code-making and cryptanalysis. The change is basically the idea of mechanizing encryption and decryption, in other words using a machine to encode the message (note that they were using machines not computers, computers make the next drastic change in cryptography). The best example of an encryption machine is the Enigma, a machine developed by the Germans that gave the code-makers the upper hand. For the next few weeks it is what I am going to talk about.

The Cipher Contest

by fortenforge, Feb 7, 2010, 3:10 AM

Sorry I have not posted for so long... I've been too busy practicing for the AMC's. I am going to start a "Cipher Contest" as you may have seen from the title of this blog post. It is a competition to find out who can create the best cipher. Everyone who wants to participate should pm (private message) me their cipher explaining it in great detail. I will grade the ciphers based on

1. Creativity - I want to see a new, original idea.
2. Usability - Does your cipher take 7 hours to encrypt the message "DOG" by hand?
3. Computer Programibility - How easy is it to turn this encryption scheme into a computer program.
4. Kerckhoffs' principality - How well does it follow Kerckhoff's principle?
5. Data transferability - Can you easily include numbers in the plaintext, what about punctuation?

Here are some ideas if you are stuck:
-A deck of cards has 52 cards which is 26*2.
-Excluding J, all the letters of the alphabet can fit in a 5 by 5 grid.
-Including the digits 0-9, all the letters of the alphabet can fit into a 6 by 6 grid.
-Including the space character, all the letters of the alphabet can fit in a 3 by 3 by 3 grid/box thingy.
-Using, the ASCII table all letters, (and other symbols) can be converted into a string 0's and 1's.

I need all cipher schemes in by February 29th.

@dragon96, do you want me to include your periodic table of the elements cipher?

Note, one person CAN submit more than one cipher, and multiple people can collaborate on the same cipher.

ADFGVX Cipher

by fortenforge, Jan 28, 2010, 12:01 AM

You may or may have not noticed that the tag for the ADFGX cipher of the previous post was ADFGVX. This is becuase the ADFGX cipher is actually a previous version of this cipher, the ADFGVX cipher. The new cipher has an extra letter (the V in case you hadn't noticed). This leaves 36 spaces in the cipher grid instead of 25. This is exactly enough space for the 26 letters of the alphabet and 10 digits. This would make statistics like temperature and # of dead in wartime settings much easier to convey. The process of enciphering and deciphering are exactly the same. Here is a sample grid:

_ A D F G V X
A q w 3 r t e
D y m u 7 i d
F 4 2 x c b n
G l h j 8 2 a
V 0 9 5 d g f
X z k L o p r

*Note: I changed the lowercase l to an uppercase L to distinguish between the l and the one. They'd look really similar otherwise (1, l)

ADFGX Cipher

by fortenforge, Jan 23, 2010, 4:31 AM

During WWI, the Germans used this cipher frequently. It worked like this:

_ A D F G X
A t h e q u
D i c k b r
F o w n f x
G m p s v a
X l z y d g

We create a 5 by 5 matrix like we did with the playfair cipher, again, we omit the letter J, when encrypting your ciphertext convert all J's to I's. As you may have guessed, every letter has a digraph mapped to it, for example, the letter "s" is equal to "GF" because it is on row G and column F. The letters A, D, F, G, and X were chosen because they sound very different when they were written in Morse Code so that there would be no errors in transmission if the ciphertext was transmitted via a telegraph. We also have to choose another keyword, for this example we will choose the word "LAZY".

Here is our plaintext:
"seven oceans on the planet earth".
We first remove all spaces:
"sevenoceansontheplanetearth"
then, we convert each letter into it's corresponding digraph.

"GF AF GG AF FF FA DD AF GX FF GF FA FF AA AD AF GD XA GX FF AF AA AF GX DX AA AD"

Now we remove spaces again:
"GFAFGGAFFFFADDAFGXFFGFFAFFAAADAFGDXAGXFFAFAAAFGXDXAAAD"

Forget about this for a sec and go back to our second keyword "LAZY", write it down:

L A Z Y

Now put the string I told you to forget about under the 4 letters wrapping about like this:

L A Z Y
G F A F
G G A F
F F F A
D D A F
G X F F
G F F A
F F A A
A D A F
G D X A
G X F F
A F A A
A F G X
D X A A
A D F D

I filled the remaining two spaces next to the last 2 characters with two "null" characters that mean nothing.

Next, alphabetize the 2nd keyword: LAZY --> ALYZ. When you move the letters of the keyword around to alphabetize it, also move the columns under the letter around so that the column under the A is still under the A after the alphabetization and the column under the L is still under the L after the alphabetization and so on:

A L Y Z
f g f a
g g f a
f f a f
d d f a
x g f f
f g a f
f f a a
d a f a
d g a x
x g f f
f a a a
f a x g
x d a a
d a d f

Then you read out the resulting letters by row: fgfaggfaffafddfaxgfffgafffaadafadgaxxgfffaaafaxgxdaadadf.

This is your ciphertext, to decrypt reverse the process and ignore any letters at the end that do not make sense, these letters are from the null characters you added.

To recognize that a cipher is an ADFGX cipher, if the ciphertext has only the letters A, D, F, G, and X, then it is probably an ADFGX cipher.

Double Playfair

by fortenforge, Jan 18, 2010, 4:55 PM

This cipher is a lot like the Playfair Cipher as you might have guessed from it's name. We won't spend much time discussing this cipher, I will just explain it so that you know what it is. Instead of having just 1 key array, you need to have 2.

This cipher really isn't much harder to break than the playfair cipher and I am too lazy to explain it so if you really want to know what it is just click this link.

Random Practice

by dragon96, Jan 16, 2010, 5:14 AM

47 11 35 04 26

or

47 30 01 23 34 45

Good luck using frequency analysis.

A Note about the Previous Post's decryption

by fortenforge, Jan 3, 2010, 10:21 PM

In the previous post, I made several assumptions about the key array that just happened to be correct, often, you will make several assumptions and find that when decrypted the plaintext looks completely wrong. If this happens go back to the last assumption you made and change it slightly. If that does not work, go back to a previous assumption. It can take a while but in the end, you will probably get the correct plaintext. This method works for cryptography in general. You can also look for words in the incorrectly decrypted ciphertext to give you a clue as to what the mistake in the key array is. We used this when we found that the last word in our incorrectly decrypted ciphertext was "AMERLCA". One of the most important skills you need to have when trying to decrpyt any ciphertext is patience.

Finally decrypting it

by fortenforge, Jan 3, 2010, 2:56 AM

We now can say that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "CQ" is "AT".

When trying to find the key array, there are a few things you need to keep in mind.

1. Remember that though the keyword is a word, any repeated letters in it will be deleted, so you should be looking to form a group of letters at the first row of the array that looks like it could be a word, but is not a word exactly.

2. When the person who wrote the message made the key array, after he chose the key word, he put the rest of the letters in alphabetical order to the end of the array, this means that "V W X Y Z" is probably the last line of the array and that the letter G will definitely go somewhere in the first 3 rows of the array. If, when making the array, you see a string of consecutive letters, like " F G H I" you are probably on the right track.

3. You want to assume that the digraphs you know form a rectangle with the letters at the corners. Let us say that you knew that the letters QL represented the letters TH,

draw a rectangle like this:

H L

Q T

We have no idea of the number of columns between Q and T, nor the number of rows between H and Q. but we do know that H and Q and L and T are on the same column and Q and T and H and L are on the same row. I drew the rectangle with H in the top left corner because it is alphabetically first. (Not e that all 4 could have been on the same row or column but that is not likely). We also know that LM and HE form a rectangle. We already have L and H in our grid so we just have to add L and M.

M E
H L
Q T

M and E technically could have gone under H and L but since E comes before H, above seems likely.

Next one, CD is RE. Since D comes directly before E in the alphabet, I'm gonna put D directly before E in our key array, once I've put D, C and R will follow:

RC
M DE
H L
Q T

Note that we could also have realized that C is on the same column as T using this next pair: CQ is AT. We have already put C, Q, and T in our array, so we just need to put the A t o complete the rectangle.

ARC
MDE
H L
Q T

Our first string of consecutive letters is "DE" so it seems that the key word ends at M and the rest of the letters are filled in alphabetically. F is not a common letter so we can assume temporarily that F comes after the E. We can also say that G is after F. And we can write VWXYZ in the last row.

ARC
MDEF
GH L
Q T
VWXYZ

We have completed enough of the ciphertext to just fill in the remaining letters in alphabetical order:

BARCI
KMDEF
GHNLO
PQSTU
VWXYZ

Looking at the key word: BARCIKM, it would look a lot more like a word if K and I were switched:

BARCK
IMDEF
GHNLO
PQSTU
VWXYZ

We could try decrypting the ciphertext now and find that it does not look very readable:

myfkevniwcdllydosxstaoifernxidayhthksnlkythdtaskknhfreusbvat
kfnehfrthdtrustyiuhaznknstiwedmlfeoynifthdsacrledxesnobfnkyi
uraodnstirslshaokpresldeosbupmhfbmlsservdxnxixiubfatlioaswns
nasthdhnodrisltyaodcixiperatliibdhaspmiwosmbiugmiutxshlstrao
slldiohfrtyfiuramerlcafphaznoiwtakdoshnuresldeoslaniathshdwi
mfpmavnkexdospikdodurlogrlsloglddesiforisperdlyafeshesldevnw
atersifoeadnrnxnznrysifhxnoshdiashlstakeoamldvsgathdrlogcniu
dvaofmaghobgtirmsatxshesemimdotsamerdxahascarxrlediooitslmpn
ybndausefhshesclevnirvlslioifthisehodggmfheldnbutbndausewesh
nueipndhaveremalodfnalshoyntithdpdeaepfhiurfirknarersafetrue
tiiurfiufehofgicumdotssidlhasbexdosidlmustknwlshshlshnodrald
iofhamerdxaosthatwearehoshempdstfhcrlslslsoiwxweevenfeerstix
idiubfatliohsatwaragalfptafarxreacdgogodtwirkifulisnoreafeha
trediurecioimylsbadfyweakeoddacifpeudodnfhbvexedaodprxrespio
slbllhtyioshnuartifsimnkutansiiurcinsnctlvkfalenretimakehamf
rhildnsafeprnuarnxhdoaldiohfraodwahnhimepmavnkexdonistlibspm
edbuslodsxsesxpmutxnrediurhdanshcarelstiicistnyiurschiinsfal
ntiximaoyafeearhdaybrlogsfurshernzpddodnshatshewaysweusedoer
gxstreogshdoiuralzersarlesaodtmbeaxnoiurpnaonxsheseareshrdfe
dxatirsifcrlslsxsublndtxtidataaodvtaldstdxpeessmeasurabnnkut
oisnsxsprihfuodpsasapxplogfhcitopddodnacrisxsiurnafeaoagghog
fkarshatamerdxasdecnhordslodvltabneafeshatshdoexsgdoeratliom
ustniwerdlsxslgmtstidasdsaytiyiushatshndhaevsnogeswefadnarer
eanthdyareserliusafeshnraremaoythdywhlloitknmexnashlyirloapm
irtspaoiftlmnkutkoiwshlsamerdxathdywhlnbemnxioshlsdaywnhathd
rbndausewehaznrhisdohiuniverfkaruodlyifourpiseivercitolhctao
dbdpscirdiosdgvdaywecimetipricnalmaododtithduntxtybvdrvaores
aofnanseprimlsessherndrlmloaldiosafewibfiutdigmasthatfirfart
ixiniogmavestraoglediurpindldxsweremaloayiuogoatliobuthoshew
irdvfhscrlpturnxhdldmehascimnxisnxaspdnddgfdlshsdgogsthdldme
hascimnxireafxelrmiurefeurhobgplrltxtirhixiseiurkntxxnbmlsti
ryticarxryhfrwardthatprexdiugbletxshatoibnrddeapasseditoring
doeratliosigdoeratlioshdgigflvdoprimlsnxhataevnareeuanannare
frexeafeanfdeserznachaornxipursunxhdlroyevnmeasurefhhapxplod
sxslfbeafxelrmhogshdbveasoessihfuroaldioweuoderstafeshatbvea
soesslpfnzeraglvdodlmustkneabfediurliubfnrhapfnzerkndoioeifs
hirtcutsirsetxtnholnirsnsxslshasoitbexdoshnuatheirshkfaloshd
arxnfnirshisewhiprkfersnlsurnxiwirkirsexekionyshnusnasuresfh
rlrhesaofnamerathdrlshaskndosherlsktakersthddiersthdmakersfh
shhobgsimednsnbratedbutmireiftdomeoafewimeoibscurehoshrdbeab
irwhihavndarrledusupshnsiobvtghnluathsiwardvprisunrltyaofnre
edimhfrusthdypackedupthdlrfkwxwibedfypissesxsliosafetravnsed
acrisxsidnaoslfpearchifaodwnlekfirusshnrtihledhosweatshipsao
dvnxtnedshewesxnfeuredshnsashifthdwhlpaoluniwedthdhamfearthe
irusshnrhftghsaodbdpedhopnaceslhkeciorirdafehntxtysburgoirma
feyafechzshaosdrsafeagaloshdsemeoafewimefptrtggledaodvacrlel
dndafewirkedldevnthdlrhafeswererawsishatwemlgmtnlveakntxxnbe
lenxhdysawamerdxaxasblbphnrthaoshdsumihfurhodpvlduanamblldio
gbreatershaoannthddpfxfkreoresfhblrthirweanthirfacldioshlsls
shrdiubfnrwecioshouetidayweremaloshdmistprisunriuspiwerfneoa
ldioioearthiurwirkersareoisnsxspriductlvnxhaowhdosdgscrlslsb
nhaoiurmhodvardoinesslovdoldzniuvbixidsafeservdxesoisnsxpfex
ededshaoshnrwerenastweekirnastmioshibeastyeariurcapaxdtyrema
hosufelmholshdlkutiurtlmeifstafehogpatfhpritndldogoarxriwlos
erestsaoluutldogfhoyopsnasaotdndlslifpshatldmehasxsurenypasx
sedvtarthogsidaywemustplckiursnsznsuulustiursenvesfhfafekngh
oagahoshewirkifremakhogamerlca

If you stare carefully at it you will find that it is semi-readable meaning that we probably just have 2 letters switched around in the key array. We can find which two letters by looking at the ciphertext and seeing what letters are getting distorted. The last 7 letters are amerlca which looks an awful lot like America, but the i is replaced with an l. So the problem is with the letter I.

'I' was one of the last letters we put in along with O, P and K. We could try switching I with each of these letters and seeing what kind of ciphertext results. We would find that when we switched I with O we got something readable.

BARCK
OMDEF
GHNLI
PQSTU
VWXYZ

When decrypted it produces:

myfelxlowcitizensxstandheretodayhumbledbythetaskbeforeusgrat
efulforthetrustyouhavebestowedmindfulofthesacrificesbornebyo
urancestorsithankpresidentbushforhisservicetoxournationaswel
lasthegenerosityandcoxoperationhehasshownthroughoutxthistran
sitionfortyfouramericanshavenowtakenthepresidentialoaththewo
rdshavebexenspokenduringrisingtidesofprosperityandthestilxlw
atersofpeaceyeteverysooftentheoathistakenamidstgatheringclou
dsandragingstormsatxthesemomentsamericahascarxriedonnotsimpl
ybecauseoftheskilxlorvisionofthoseinhighofficebutbecauseweth
epeoplehaveremainedfaithfultotheidealsofourforbearersandtrue
toourfoundingdocumentssoithasbexensoitmustbewiththisgenerati
onofamericansthatweareinthemidstofcrisisisnowxwelxlunderstox
odournationisatwaragainstafarxreachingnetworkofviolenceandha
tredoureconomyisbadlyweakenedaconseuenceofgrexedandirxrespon
sibilityonthepartofsomebutalsoourcollectivefailuretomakehard
choicesandpreparethenationforanewagehomeshavebexenlostiobssh
edbusinesxsesxshutteredourhealthcareistoocostlyourschoolsfai
ltoxomanyandeachdaybringsfurtherevidencethatthewaysweuseener
gystrengthenouradversariesandthreatenourplanetthesearetheind
icatorsofcrisisxsubiectxtodataandstatisticslessmeasurablebut
nolesxsprofoundisasapxpingofconfidenceacrosxsourlandanagging
fearthatamericasdeclineisinevitableandthatthenextgenerationm
ustloweritsxsightstodayisaytoyouthatthechalxlengeswefacearer
ealtheyareseriousandtheyaremanytheywillnotbemeteasilyorinash
ortspanoftimebutknowthisamericatheywillbemetonthisdaywegathe
rbecausewehavechosenhopeoverfearunityofpurposeoverconflictan
dxdiscordonthisdaywecometoproclaimanendtothepetxtygrievances
andfalsepromisestherecriminationsandwornoutdogmasthatforfart
oxolonghavestrangledourpoliticsweremainayoungnationbutinthew
ordsofscripturethetimehascometosetasidechildishthingsthetime
hascometoreafxfirmourenduringspiritxtochoxoseourbetxterhisto
rytocarxryforwardthatpreciousgiftxthatnobleideapassedonfromg
enerationtogenerationthegodgivenpromisethatalxlareeualallare
frexeandalldeserveachancetopursuetheirfulxlmeasureofhapxpine
sxsinreafxfirmingthegreatnessofournationweunderstandthatgrea
tnessisneveragivenitmustbeearnedouriourneyhasneverbeenoneofs
hortcutsorsetxtlingforlesxsithasnotbexenthepathforthefainthe
artedforthosewhopreferleisuretoworkorsexekonlythepleasuresof
richesandfameratherithasbeentherisktakersthedoersthemakersof
thingssomecelebratedbutmoreoftenmenandwomenobscureintheirlab
orwhohavecarriedusupthelongruggedpathtowardsprosperityandfre
edomforustheypackeduptheirfewxworldlypossesxsionsandtraveled
acrosxsoceansinsearchofanewlifeforustheytoiledinsweatshopsan
dsettledthewestenduredthelashofthewhipandplowedthehardearthf
orustheyfoughtandxdiedinplaceslikeconcordandgetxtysburgnorma
ndyandkhzshantiesandagainthesemenandwomenstruggledandsacrifi
cedandworkedtilxltheirhandswererawsothatwemightliveabetxterl
ifetheysawamericaxasbigxgerthanthesumofourindividualambition
sgreaterthanallthedifxferencesofbirthorwealthorfactionthisis
theiourneywecontinuetodayweremainthemostprosperouspowerfulna
tiononearthourworkersarenolesxsproductivethanwhenthiscrisisb
eganourmindsarenolessinventiveourgoxodsandservicesnolesxsnex
ededthantheywerelastweekorlastmonthorlastyearourcapacityrema
insundiminishedbutourtimeofstandingpatofprotectingnarxrowint
erestsandputtingoffunpleasantdecisionsthattimehasxsurelypasx
sedstartingtodaywemustpickourselvesupdustourselvesoffandbegi
nagaintheworkofremakingamerica :)

If you can't read it now, I can't help you.

Decrypting the Ciphertext from the previous post

by fortenforge, Dec 20, 2009, 1:31 AM

Okay, so, first I want you to copy the entire plaintext from the previous post. Then I want you to click this link. Paste the ciphertext into the big empty box under the words "Enter your ciphertext or comparison text here:" and click Submit. You should see a page with 3 tables. Look at the one whose cells are mostly green and whose title is "Most common digraphs". It will then list the frequency of the digraphs in the ciphertext and tell you which one appears the most. I have never actually told you which digraphs appear the most often in the English language, but we can figure out which ones do based on the monograph frequencies. The most common word in the English language is "THE" so we would expect the digraphs "TH" and "HE" to be very high up on the list. We could also say that "TH" would probably appear more often than "HE" because it also appears in many other words. You may notice that the table also gives us the frequency of the reversed digraph. This is extremely useful when trying to decrypt a ciphertext encrypted with playfair because if you examine the algorithm playfair uses for encryption you will realize that if "QP" gets encrypted as "KL", "PQ" must get encrypted as "LK". In the table, the darker the shade of green, the more appearances of the digraph. In the English language, there is one very common digraph whose reverse digraph is almost just as equally as common. This pair of letters is "ER" (or "RE"). If we look at the table the pair of digraph and reverse digraphs that are both very high in frequency are the pairs "CD" and "DC". Also, the highest frequency is the digraph "QL" and the second highest is "LM". We can now safely assume that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "DC" is "ER". Our goal is to find the correct key array, then we can decrypt the entire ciphertext. We can probably say that the last row of our 5 by 5 key table is "V W X Y Z" since these letters will probably not appear in our keyword. Now, we need to identify more digraphs before beginning to construct our key table. It is very likely that somewhere in the passage the phrase "THAT THE" will appear. If it does and is spaced like this: "TH AT TH E*" (* represents an unknown character) then we we know that in the ciphertext will be "QL ** QL **". We can look in our ciphertext for two QL's separated by 2 characters, and then assume that those two characters are AT. It turns out that "QL ** QL" appears 3 times in our ciphertext and in every single one of the times the ** was "CQ". We now can say that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "CQ" is "AT". We are now done with the first step, we have figured out what a sufficient number of digraphs are. Step 2, which will be the next post, is figuring out what the key array is based on this.

Playfair Ciphertext (For Later)

by fortenforge, Dec 12, 2009, 3:32 AM

ew of iy ge ya ls nx fl xr tu kh mi dc ly me cw nq oa tl or cy lm qc ur co om cd pt ib cq fo tn om cs lm sc pt yc fp qm yo co tu mv fe dh if nz ge eu lm qr kc nd lr dt og ki oc ve sk kh el tu db xs ql kh bu cd xs ef lu kp qi om ai sx td bx lr ly dv fp ki cq gd hk qx lt hc tu lm lo lf bd xs yc kh er dv gv dc cq gd gi ml rq qi mv lu ia fp hi fp sy ql sx sc kh xs sl fg om cs ze fp cr df ds kr iu qm yo gf yq rb fl ql ot cd xs ef lu hr ge cq lq lm vm di qi bw oc dy fl tq fb fl fs ds gh ds xs gh sl ef pd ou bd tq dc ls wc if ql dt sl iy hy cq dc pd ou mc el cl yl yo cx pd mo yl lu lm mb ql sx qc cf hk dh ix pl cq lm ds gh et fp ix kh id bh lg ip pe ad qr sy ql dt fd md fl ut mh dc lr mq rq kr dr ds fe fg gf ut hd tg vc le kq td mo ql dt rn iy ge bx sx gd gf eu gm td lg il hi mo dn el kp pc le kq td ym ql ot fm tg ml bw dc fd rh lf eo rh ql nz ty ep lm si mc it mo fp kd db co rc dc qr if sc tf pe fp kd fp if lg io eb qf fl ut pd ls qm pr dy fl pd ls fq tu co xh ql ql sx lo lf cr sl fg mo mh dc lr kh tu qm qy mc cd lg ql fd si tu mo kc sx sx sx gf xy ym iy nt if dc tu dv me fp ki cq gd gl qr qy rc bh rh iu qc mk dr cd rk il gh lf qy db bf oz gd tl lk mc if qm sc fe fp cd be gf ew sx ar ei zx mc cf lf mr be iu ft fl el mo ib dy fe kh is dr cd tq fg xs rg nl yc fg ql ot rc pe du md oc pu ch pd fp ck eg tl ey gx fo rh nt cd pe hm cf qm di al dg el qr if sb ot rc ly lm hk sl fg om cr lf am lo gm df qi bw oc dy fl ge tu gd rp qi fe kp xs lf xr td xr qi pu yl cd em sk lm ch ql kr cd sx pe eb dp yt ve sk tr gm eg ud rh ty dv md kh wc if mc al mr vc ds gh ud sk ql dc oy si fl el ql cq ql my cw qx ft td fl dc lv tu cd gh ql fl fp cr ox dc qr ds dt kh es ia mc yl gf sk tg kh ly ql dt mc cd ql dl if lr cq db pd ek ds xs xr tp rg le sy pe mr qc kh ix qc sl tu lr ti dt qd mc tp cr cg oc pu gf tl xr tq bd om zu is qr qr sv sg gh mo be un si fl el rk bd xr pd sk hc if kh bh hl gh of rc ql cq mh dc lr rq ef et lg dl xs lf xg qc cg mc if ql cq ql fl dy pl fl dc cq gd hf pt yt mv dc ls xr xs hi ut pe mr xl qr cy ev fp ql cq ql le qm iy tl gh dt ym mk el rc dc mc ty lm wc cd td ds fp qr if ql lc rc fd kh cy lm zx ln ng ep co df yl rq ln ve ds hk qi db ut qb gf eu hd oc pu fu mv ql sx mh dc lr cq lm zx ln gc fd ly fg ql sx mr zx ol cq lm ca le kq td ym qm yo al dp fl gm to gb dc of rc zu ls ve ou sk vg td gb dc be un nl ey kh ir is tr db em lu il xi cw ym be df pe sb eb hc hd kh fl es ep lm to sy yc ib ld wb lk dt kh eo ch td sb md sx dt ql dc le ds dh hk sl fg qr if vm ki fp se gp hm tu qm ue db mk cs dv eg fg hi bw dt sc kh hn fe fp bs eg ls lr qx dc fd rh hk ve zu hg cq gd gk pu lg ql my db ix mo tr ds qu sk ly lm sl df qm tr md ly dp ly rq si le il ie sx lq il gh tu lm sl df qm tr md ly db mc dz dn ad fp cd if sk lg ip sg ds sy pe al dv dp fm sk co sy yl ai sx pe cx pe kr dr cx om ax rc es qm uq cd rl fp pi nd sy ql cq gf cg dl ef bq rq td em un bd oh fl dc cq gd lu gp fl dc cq gd lu lm pg oi gx fl sb md sx ly qm qc iy hc cd ft ch ch hc cd dk dy mc if ch ie dt dc yo rk qm lk ly gv sk tp ly lm sd nz iy he mc tp cd mo qm sv sg lf xr xs ik mc dz dn ad lg lp lm ib mc ul dt pd om sk hk sl fg ym zu ef dx qc if ql cq ib mc ul dt xs ui oy dc bh gx fl ls fq tu co mc ki fe fp ds fp ki lc qm ui oy dc co fl fg fm du gm cs kt ut db td sy yt lg no db tl xr xs ql rq gf pc dy fl ql ot cq nm db ql fo rh lu lm rc yl eo db ql dp my gm sb fo dc tl sx sk ly mv db bf dx dy fc fg tc ql ot tl rq sk dt mo ds al dt kh eo mh dc cq lm ds ql rq co fl ql dc sx cu rb dc tu lm em dc tu lm hm cf dx mo ql lg ip pd df el tl ac cq fe kp qe db fm eu fl df hk if vm df gf rp kt cd lg ql dl ci ra db aq mg bw le rc ds fe pt pq ql lt fg ib pn lo os cq lq mv rc ix sb dp to ds yc kh eo cd fe md om ks tu lm vt rk cf fs qu lm sd of xy vm ci ei vt dp td xr xs fg qr if sc bw lt fe rk bd xr pd el kh xs iu mc ck gm mk lf yh nd fo db pt ql lc pe ln fe lg qx mc ut gm qt kh ix ly yt fe ql my dt yl if sk fe ql lt rq gm eu lm aq gs kh os ge ym es lm qm di mc cs nm db pt ql lc om pn lq kh ir is fe lg tg rk dt nl cf be lk db mr if lo sy yc pr sk hg db hm if wc if an xu qm lu ld qr if bh rh lu lm td df hk if vm df iu sc pn hn fe kh ix rk ds dn el mr if vm cb fe sl iy ty lm sd qm if qx dc dc ma pd ql cq ym dh hi yt gx mc co sy yl ci nd ly lm xt ma mh dc lr rw rq rg iv lo cs qm lu lm tp dm om sk lg is xg fs ch mh rg sl fg pi cd cq dc ql kh ch ty lm is dz of cd lk dt mo rg cs gm ax mc ty gm kd rk sl fg ql sx sx ql dl fp ki lc ym be lu lg tf pe mr zx dc fd rh lu lm dm tu sb dp to bd pt vg ym kd tn hk sl fg fg mc cs gm sk vm cb dc qr cd gf tl xr tq bd fs ey gx ly qm hz lm lu il tr ds xs pr ol kh fp ad lg ix rc fl eg dt xs gz fl sl yo fp bi dv me qr if td bx lr dt gf tl xr ui dy fe fe ql kh ql lc ym cd hc tu ym fc db hc tu dm lu gm ci rq yc mc bd sk kr qb rl yc cd hm lg tp if hd lg sx lm or pu fp cs hd fm du qc if lg pv cq mo sb ep le sl gh hk dr bd xh lu dc dt ut kh os pu sl gh mo nz gu tl rq kh se le sx gd iu ql cq sl df qm xr tp cd tc qb xr td ix qc cs lg lp me cw ym fq tu sg kb fp dx lt yo tp so pt pe sk td gy dt mo mk if co hl hk hb lg ql my db bf dk fd rb lg hb df ds kr

A guide to the science of secrecy

avatar

fortenforge
Archives
Shouts
Submit
  • Good website!

    by bluegoose101, Aug 5, 2021, 6:28 PM

  • uh-huh, a great place here

    by fenchelfen, Sep 1, 2019, 11:30 AM

  • uh, yeah he is o_O

    by SonyWii, Oct 8, 2010, 2:11 PM

  • dude i think you're my roommate from camp :O

    by themorninglighttt, Aug 29, 2010, 10:06 PM

  • what i'm still not a contrib D:

    by SonyWii, Aug 6, 2010, 2:20 PM

  • I see what you did there

    by Jongy, Aug 1, 2010, 11:52 PM

  • omg, apparently you like cryptography; and apparently I'm not a contribb D:

    by SonyWii, Jul 26, 2010, 9:48 PM

  • Thank You

    by fortenforge, Jan 17, 2010, 6:35 PM

  • Wow this is a really cool blog

    by alkjash, Jan 16, 2010, 7:04 PM

  • Hi :)

    by fortenforge, Jan 7, 2010, 12:12 AM

  • Hi :)

    by Richard_Min, Jan 5, 2010, 9:29 PM

  • Hi :) :)

    by fortenforge, Jan 3, 2010, 10:14 PM

  • HELLO FORTENFORGE I AM THE PERSON SITTING NEXT TO YOU IN IDEAMATH

    by ButteredButNotEaten, Dec 24, 2009, 4:19 AM

  • @dragon96 Not if you celebrate Christmas with neon lights
    @batteredbutnotdefeated Sure, You are now a contributer

    by fortenforge, Dec 20, 2009, 4:39 AM

  • I too share a love for cryptography and cryptanalysis, may I be a contrib?

    by batteredbutnotdefeated, Dec 20, 2009, 2:38 AM

  • The green is too bright for Christmas. :P

    by dragon96, Dec 20, 2009, 2:12 AM

  • I thought I'd change the colors for the Holidays :lol:

    by fortenforge, Dec 13, 2009, 10:53 PM

  • hi, some "simple" cryptography here: http://www.artofproblemsolving.com/Forum/weblog_entry.php?t=317795

    by phiReKaLk6781, Dec 12, 2009, 3:46 AM

  • Yeah, that is binary, for modern cryptography, most text is converted to binary first and then algorithm's for encryption are preformed on the binary rather than the English letters. The text is converted using the ASCII table or UNICODE.

    by fortenforge, Oct 13, 2009, 10:33 PM

  • Whoa, I love your background! Is that binary?

    by pianogirl, Oct 13, 2009, 8:34 PM

  • Sure, I'll add you as a contributer...

    by fortenforge, Oct 2, 2009, 4:44 AM

  • May I make a post on one cipher I made up? (It's a good code for science people! *hint hint*)

    by dragon96, Oct 2, 2009, 4:04 AM

  • Nice blog, this is interesting... :lol:

    and guess who i am :ninja:

    by Yoshi, Sep 21, 2009, 4:02 AM

  • Thanks :lol:

    by fortenforge, Sep 17, 2009, 1:33 AM

  • Very interesting blog. Nice!

    by AIME15, Sep 16, 2009, 5:21 PM

  • When you mean 'write' do you mean like programming? Much of cryptography has to do with programming and most modern cryptographers are excellent programmers because modern complex ciphers are difficult to implement by hand.

    See if you can write a program for the substitution cipher. The user should be able to enter the key and the message. I know it is possible to do it in pretty much any language because I was able to do it in c.

    by fortenforge, Aug 7, 2009, 8:17 PM

  • Hello. I don't know much about advanced cryptography but I did write a Caeser Chipher encrypter and decrypter!

    by Poincare, Jul 31, 2009, 8:55 PM

27 shouts
Tags
About Owner
  • Posts: 200
  • Joined: Jan 17, 2009
Blog Stats
  • Blog created: Jun 21, 2009
  • Total entries: 48
  • Total visits: 126781
  • Total comments: 16
Search Blog
a