Is the geometric function injective?
by Project_Donkey_into_M4, Apr 20, 2025, 6:23 PM
A non-degenerate triangle
is given in the plane, let
be the set of points which lie strictly inside it. Also let
be the set of circles in the plane. For a point
, let
be the reflection of
in sides
respectively. Define a function
such that
is the circumcircle of
. Is
injective?
Note: The function
is called injective if for any
, 











Note: The function



This post has been edited 1 time. Last edited by Project_Donkey_into_M4, Yesterday at 6:24 PM
Equal Distances in an Isosceles Setting
by mojyla222, Apr 20, 2025, 5:05 AM
Let
be an isosceles triangle with
. The circle
, passing through
and
, intersects segment
at
. The circle
is tangent to
at
and passes through
. Let
and
be the midpoints of segments
and
, respectively. The line
intersects
and
at points
and
, respectively, where
and
are the intersections closer to
. Prove that
.
Proposed by Hooman Fattahi
























Proposed by Hooman Fattahi
3 knightlike moves is enough
by sarjinius, Mar 9, 2025, 3:38 PM
An ant is on the Cartesian plane. In a single move, the ant selects a positive integer
, then either travels
, the ant can choose to go to one of eight possible points.
Prove that, for any integers
and
, the ant can travel from
to
using at most
moves.

units vertically (up or down) and
units horizontally (left or right); or
units horizontally (left or right) and
units vertically (up or down).

Prove that, for any integers





Dear Sqing: So Many Inequalities...
by hashtagmath, Oct 30, 2024, 5:52 AM
I have noticed thousands upon thousands of inequalities that you have posted to HSO and was wondering where you get the inspiration, imagination, and even the validation that such inequalities are true? Also, what do you find particularly appealing and important about specifically inequalities rather than other branches of mathematics? Thank you 

D860 : Flower domino and unconnected
by Dattier, May 26, 2024, 9:03 AM
Let G be a grid of size m*n.
We have 2 dominoes in flowers and not connected like here

Determine a necessary and sufficient condition on m and n, so that G can be covered with these 2 kinds of dominoes.
We have 2 dominoes in flowers and not connected like here

Determine a necessary and sufficient condition on m and n, so that G can be covered with these 2 kinds of dominoes.
winning strategy, vertices of regular n-gon
by parmenides51, Sep 4, 2022, 5:01 PM
The vertices of a regular polygon with
sides are marked on the blackboard. Ana and Beto play alternately, Ana begins. Each player, in turn, must do the following:
join two vertices with a segment, without cutting another already marked segment; or
delete a vertex that does not belong to any marked segment.
The player who cannot take any action on his turn loses the game. Determine which of the two players can guarantee victory:
a) if
b) if



The player who cannot take any action on his turn loses the game. Determine which of the two players can guarantee victory:
a) if

b) if

numbers at vertices of triangle / tetrahedron, consecutive and gcd related
by parmenides51, Sep 4, 2022, 4:59 PM
a) A positive integer is written at each vertex of a triangle. Then on each side of the triangle the greatest common divisor of its ends is written. It is possible that the numbers written on the sides be three consecutive integers, in some order?
b) A positive integer is written at each vertex of a tetrahedron. Then, on each edge of the tetrahedron is written the greatest common divisor of its ends . It is possible that the numbers written in the edges are six consecutive integers, in some order?
b) A positive integer is written at each vertex of a tetrahedron. Then, on each edge of the tetrahedron is written the greatest common divisor of its ends . It is possible that the numbers written in the edges are six consecutive integers, in some order?
red squares in a 7x7 board
by parmenides51, Sep 4, 2022, 4:44 PM
In a
board, some squares are painted red. Let
be the number of rows that have an odd number of red squares and let
be the number of columns that have an odd number of red squares. Find all possible values of
. For each value found, give a example of how the board can be painted.




This post has been edited 3 times. Last edited by parmenides51, Dec 10, 2022, 3:39 AM
Finally decrypting it
by fortenforge, Jan 3, 2010, 2:56 AM
We now can say that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "CQ" is "AT".
When trying to find the key array, there are a few things you need to keep in mind.
1. Remember that though the keyword is a word, any repeated letters in it will be deleted, so you should be looking to form a group of letters at the first row of the array that looks like it could be a word, but is not a word exactly.
2. When the person who wrote the message made the key array, after he chose the key word, he put the rest of the letters in alphabetical order to the end of the array, this means that "V W X Y Z" is probably the last line of the array and that the letter G will definitely go somewhere in the first 3 rows of the array. If, when making the array, you see a string of consecutive letters, like " F G H I" you are probably on the right track.
3. You want to assume that the digraphs you know form a rectangle with the letters at the corners. Let us say that you knew that the letters QL represented the letters TH,
draw a rectangle like this:
H L
Q T
We have no idea of the number of columns between Q and T, nor the number of rows between H and Q. but we do know that H and Q and L and T are on the same column and Q and T and H and L are on the same row. I drew the rectangle with H in the top left corner because it is alphabetically first. (Not e that all 4 could have been on the same row or column but that is not likely). We also know that LM and HE form a rectangle. We already have L and H in our grid so we just have to add L and M.
M E
H L
Q T
M and E technically could have gone under H and L but since E comes before H, above seems likely.
Next one, CD is RE. Since D comes directly before E in the alphabet, I'm gonna put D directly before E in our key array, once I've put D, C and R will follow:
RC
M DE
H L
Q T
Note that we could also have realized that C is on the same column as T using this next pair: CQ is AT. We have already put C, Q, and T in our array, so we just need to put the A t o complete the rectangle.
ARC
MDE
H L
Q T
Our first string of consecutive letters is "DE" so it seems that the key word ends at M and the rest of the letters are filled in alphabetically. F is not a common letter so we can assume temporarily that F comes after the E. We can also say that G is after F. And we can write VWXYZ in the last row.
ARC
MDEF
GH L
Q T
VWXYZ
We have completed enough of the ciphertext to just fill in the remaining letters in alphabetical order:
BARCI
KMDEF
GHNLO
PQSTU
VWXYZ
Looking at the key word: BARCIKM, it would look a lot more like a word if K and I were switched:
BARCK
IMDEF
GHNLO
PQSTU
VWXYZ
We could try decrypting the ciphertext now and find that it does not look very readable:
myfkevniwcdllydosxstaoifernxidayhthksnlkythdtaskknhfreusbvat
kfnehfrthdtrustyiuhaznknstiwedmlfeoynifthdsacrledxesnobfnkyi
uraodnstirslshaokpresldeosbupmhfbmlsservdxnxixiubfatlioaswns
nasthdhnodrisltyaodcixiperatliibdhaspmiwosmbiugmiutxshlstrao
slldiohfrtyfiuramerlcafphaznoiwtakdoshnuresldeoslaniathshdwi
mfpmavnkexdospikdodurlogrlsloglddesiforisperdlyafeshesldevnw
atersifoeadnrnxnznrysifhxnoshdiashlstakeoamldvsgathdrlogcniu
dvaofmaghobgtirmsatxshesemimdotsamerdxahascarxrlediooitslmpn
ybndausefhshesclevnirvlslioifthisehodggmfheldnbutbndausewesh
nueipndhaveremalodfnalshoyntithdpdeaepfhiurfirknarersafetrue
tiiurfiufehofgicumdotssidlhasbexdosidlmustknwlshshlshnodrald
iofhamerdxaosthatwearehoshempdstfhcrlslslsoiwxweevenfeerstix
idiubfatliohsatwaragalfptafarxreacdgogodtwirkifulisnoreafeha
trediurecioimylsbadfyweakeoddacifpeudodnfhbvexedaodprxrespio
slbllhtyioshnuartifsimnkutansiiurcinsnctlvkfalenretimakehamf
rhildnsafeprnuarnxhdoaldiohfraodwahnhimepmavnkexdonistlibspm
edbuslodsxsesxpmutxnrediurhdanshcarelstiicistnyiurschiinsfal
ntiximaoyafeearhdaybrlogsfurshernzpddodnshatshewaysweusedoer
gxstreogshdoiuralzersarlesaodtmbeaxnoiurpnaonxsheseareshrdfe
dxatirsifcrlslsxsublndtxtidataaodvtaldstdxpeessmeasurabnnkut
oisnsxsprihfuodpsasapxplogfhcitopddodnacrisxsiurnafeaoagghog
fkarshatamerdxasdecnhordslodvltabneafeshatshdoexsgdoeratliom
ustniwerdlsxslgmtstidasdsaytiyiushatshndhaevsnogeswefadnarer
eanthdyareserliusafeshnraremaoythdywhlloitknmexnashlyirloapm
irtspaoiftlmnkutkoiwshlsamerdxathdywhlnbemnxioshlsdaywnhathd
rbndausewehaznrhisdohiuniverfkaruodlyifourpiseivercitolhctao
dbdpscirdiosdgvdaywecimetipricnalmaododtithduntxtybvdrvaores
aofnanseprimlsessherndrlmloaldiosafewibfiutdigmasthatfirfart
ixiniogmavestraoglediurpindldxsweremaloayiuogoatliobuthoshew
irdvfhscrlpturnxhdldmehascimnxisnxaspdnddgfdlshsdgogsthdldme
hascimnxireafxelrmiurefeurhobgplrltxtirhixiseiurkntxxnbmlsti
ryticarxryhfrwardthatprexdiugbletxshatoibnrddeapasseditoring
doeratliosigdoeratlioshdgigflvdoprimlsnxhataevnareeuanannare
frexeafeanfdeserznachaornxipursunxhdlroyevnmeasurefhhapxplod
sxslfbeafxelrmhogshdbveasoessihfuroaldioweuoderstafeshatbvea
soesslpfnzeraglvdodlmustkneabfediurliubfnrhapfnzerkndoioeifs
hirtcutsirsetxtnholnirsnsxslshasoitbexdoshnuatheirshkfaloshd
arxnfnirshisewhiprkfersnlsurnxiwirkirsexekionyshnusnasuresfh
rlrhesaofnamerathdrlshaskndosherlsktakersthddiersthdmakersfh
shhobgsimednsnbratedbutmireiftdomeoafewimeoibscurehoshrdbeab
irwhihavndarrledusupshnsiobvtghnluathsiwardvprisunrltyaofnre
edimhfrusthdypackedupthdlrfkwxwibedfypissesxsliosafetravnsed
acrisxsidnaoslfpearchifaodwnlekfirusshnrtihledhosweatshipsao
dvnxtnedshewesxnfeuredshnsashifthdwhlpaoluniwedthdhamfearthe
irusshnrhftghsaodbdpedhopnaceslhkeciorirdafehntxtysburgoirma
feyafechzshaosdrsafeagaloshdsemeoafewimefptrtggledaodvacrlel
dndafewirkedldevnthdlrhafeswererawsishatwemlgmtnlveakntxxnbe
lenxhdysawamerdxaxasblbphnrthaoshdsumihfurhodpvlduanamblldio
gbreatershaoannthddpfxfkreoresfhblrthirweanthirfacldioshlsls
shrdiubfnrwecioshouetidayweremaloshdmistprisunriuspiwerfneoa
ldioioearthiurwirkersareoisnsxspriductlvnxhaowhdosdgscrlslsb
nhaoiurmhodvardoinesslovdoldzniuvbixidsafeservdxesoisnsxpfex
ededshaoshnrwerenastweekirnastmioshibeastyeariurcapaxdtyrema
hosufelmholshdlkutiurtlmeifstafehogpatfhpritndldogoarxriwlos
erestsaoluutldogfhoyopsnasaotdndlslifpshatldmehasxsurenypasx
sedvtarthogsidaywemustplckiursnsznsuulustiursenvesfhfafekngh
oagahoshewirkifremakhogamerlca
If you stare carefully at it you will find that it is semi-readable meaning that we probably just have 2 letters switched around in the key array. We can find which two letters by looking at the ciphertext and seeing what letters are getting distorted. The last 7 letters are amerlca which looks an awful lot like America, but the i is replaced with an l. So the problem is with the letter I.
'I' was one of the last letters we put in along with O, P and K. We could try switching I with each of these letters and seeing what kind of ciphertext results. We would find that when we switched I with O we got something readable.
BARCK
OMDEF
GHNLI
PQSTU
VWXYZ
When decrypted it produces:
myfelxlowcitizensxstandheretodayhumbledbythetaskbeforeusgrat
efulforthetrustyouhavebestowedmindfulofthesacrificesbornebyo
urancestorsithankpresidentbushforhisservicetoxournationaswel
lasthegenerosityandcoxoperationhehasshownthroughoutxthistran
sitionfortyfouramericanshavenowtakenthepresidentialoaththewo
rdshavebexenspokenduringrisingtidesofprosperityandthestilxlw
atersofpeaceyeteverysooftentheoathistakenamidstgatheringclou
dsandragingstormsatxthesemomentsamericahascarxriedonnotsimpl
ybecauseoftheskilxlorvisionofthoseinhighofficebutbecauseweth
epeoplehaveremainedfaithfultotheidealsofourforbearersandtrue
toourfoundingdocumentssoithasbexensoitmustbewiththisgenerati
onofamericansthatweareinthemidstofcrisisisnowxwelxlunderstox
odournationisatwaragainstafarxreachingnetworkofviolenceandha
tredoureconomyisbadlyweakenedaconseuenceofgrexedandirxrespon
sibilityonthepartofsomebutalsoourcollectivefailuretomakehard
choicesandpreparethenationforanewagehomeshavebexenlostiobssh
edbusinesxsesxshutteredourhealthcareistoocostlyourschoolsfai
ltoxomanyandeachdaybringsfurtherevidencethatthewaysweuseener
gystrengthenouradversariesandthreatenourplanetthesearetheind
icatorsofcrisisxsubiectxtodataandstatisticslessmeasurablebut
nolesxsprofoundisasapxpingofconfidenceacrosxsourlandanagging
fearthatamericasdeclineisinevitableandthatthenextgenerationm
ustloweritsxsightstodayisaytoyouthatthechalxlengeswefacearer
ealtheyareseriousandtheyaremanytheywillnotbemeteasilyorinash
ortspanoftimebutknowthisamericatheywillbemetonthisdaywegathe
rbecausewehavechosenhopeoverfearunityofpurposeoverconflictan
dxdiscordonthisdaywecometoproclaimanendtothepetxtygrievances
andfalsepromisestherecriminationsandwornoutdogmasthatforfart
oxolonghavestrangledourpoliticsweremainayoungnationbutinthew
ordsofscripturethetimehascometosetasidechildishthingsthetime
hascometoreafxfirmourenduringspiritxtochoxoseourbetxterhisto
rytocarxryforwardthatpreciousgiftxthatnobleideapassedonfromg
enerationtogenerationthegodgivenpromisethatalxlareeualallare
frexeandalldeserveachancetopursuetheirfulxlmeasureofhapxpine
sxsinreafxfirmingthegreatnessofournationweunderstandthatgrea
tnessisneveragivenitmustbeearnedouriourneyhasneverbeenoneofs
hortcutsorsetxtlingforlesxsithasnotbexenthepathforthefainthe
artedforthosewhopreferleisuretoworkorsexekonlythepleasuresof
richesandfameratherithasbeentherisktakersthedoersthemakersof
thingssomecelebratedbutmoreoftenmenandwomenobscureintheirlab
orwhohavecarriedusupthelongruggedpathtowardsprosperityandfre
edomforustheypackeduptheirfewxworldlypossesxsionsandtraveled
acrosxsoceansinsearchofanewlifeforustheytoiledinsweatshopsan
dsettledthewestenduredthelashofthewhipandplowedthehardearthf
orustheyfoughtandxdiedinplaceslikeconcordandgetxtysburgnorma
ndyandkhzshantiesandagainthesemenandwomenstruggledandsacrifi
cedandworkedtilxltheirhandswererawsothatwemightliveabetxterl
ifetheysawamericaxasbigxgerthanthesumofourindividualambition
sgreaterthanallthedifxferencesofbirthorwealthorfactionthisis
theiourneywecontinuetodayweremainthemostprosperouspowerfulna
tiononearthourworkersarenolesxsproductivethanwhenthiscrisisb
eganourmindsarenolessinventiveourgoxodsandservicesnolesxsnex
ededthantheywerelastweekorlastmonthorlastyearourcapacityrema
insundiminishedbutourtimeofstandingpatofprotectingnarxrowint
erestsandputtingoffunpleasantdecisionsthattimehasxsurelypasx
sedstartingtodaywemustpickourselvesupdustourselvesoffandbegi
nagaintheworkofremakingamerica
If you can't read it now, I can't help you.
When trying to find the key array, there are a few things you need to keep in mind.
1. Remember that though the keyword is a word, any repeated letters in it will be deleted, so you should be looking to form a group of letters at the first row of the array that looks like it could be a word, but is not a word exactly.
2. When the person who wrote the message made the key array, after he chose the key word, he put the rest of the letters in alphabetical order to the end of the array, this means that "V W X Y Z" is probably the last line of the array and that the letter G will definitely go somewhere in the first 3 rows of the array. If, when making the array, you see a string of consecutive letters, like " F G H I" you are probably on the right track.
3. You want to assume that the digraphs you know form a rectangle with the letters at the corners. Let us say that you knew that the letters QL represented the letters TH,
draw a rectangle like this:
H L
Q T
We have no idea of the number of columns between Q and T, nor the number of rows between H and Q. but we do know that H and Q and L and T are on the same column and Q and T and H and L are on the same row. I drew the rectangle with H in the top left corner because it is alphabetically first. (Not e that all 4 could have been on the same row or column but that is not likely). We also know that LM and HE form a rectangle. We already have L and H in our grid so we just have to add L and M.
M E
H L
Q T
M and E technically could have gone under H and L but since E comes before H, above seems likely.
Next one, CD is RE. Since D comes directly before E in the alphabet, I'm gonna put D directly before E in our key array, once I've put D, C and R will follow:
RC
M DE
H L
Q T
Note that we could also have realized that C is on the same column as T using this next pair: CQ is AT. We have already put C, Q, and T in our array, so we just need to put the A t o complete the rectangle.
ARC
MDE
H L
Q T
Our first string of consecutive letters is "DE" so it seems that the key word ends at M and the rest of the letters are filled in alphabetically. F is not a common letter so we can assume temporarily that F comes after the E. We can also say that G is after F. And we can write VWXYZ in the last row.
ARC
MDEF
GH L
Q T
VWXYZ
We have completed enough of the ciphertext to just fill in the remaining letters in alphabetical order:
BARCI
KMDEF
GHNLO
PQSTU
VWXYZ
Looking at the key word: BARCIKM, it would look a lot more like a word if K and I were switched:
BARCK
IMDEF
GHNLO
PQSTU
VWXYZ
We could try decrypting the ciphertext now and find that it does not look very readable:
myfkevniwcdllydosxstaoifernxidayhthksnlkythdtaskknhfreusbvat
kfnehfrthdtrustyiuhaznknstiwedmlfeoynifthdsacrledxesnobfnkyi
uraodnstirslshaokpresldeosbupmhfbmlsservdxnxixiubfatlioaswns
nasthdhnodrisltyaodcixiperatliibdhaspmiwosmbiugmiutxshlstrao
slldiohfrtyfiuramerlcafphaznoiwtakdoshnuresldeoslaniathshdwi
mfpmavnkexdospikdodurlogrlsloglddesiforisperdlyafeshesldevnw
atersifoeadnrnxnznrysifhxnoshdiashlstakeoamldvsgathdrlogcniu
dvaofmaghobgtirmsatxshesemimdotsamerdxahascarxrlediooitslmpn
ybndausefhshesclevnirvlslioifthisehodggmfheldnbutbndausewesh
nueipndhaveremalodfnalshoyntithdpdeaepfhiurfirknarersafetrue
tiiurfiufehofgicumdotssidlhasbexdosidlmustknwlshshlshnodrald
iofhamerdxaosthatwearehoshempdstfhcrlslslsoiwxweevenfeerstix
idiubfatliohsatwaragalfptafarxreacdgogodtwirkifulisnoreafeha
trediurecioimylsbadfyweakeoddacifpeudodnfhbvexedaodprxrespio
slbllhtyioshnuartifsimnkutansiiurcinsnctlvkfalenretimakehamf
rhildnsafeprnuarnxhdoaldiohfraodwahnhimepmavnkexdonistlibspm
edbuslodsxsesxpmutxnrediurhdanshcarelstiicistnyiurschiinsfal
ntiximaoyafeearhdaybrlogsfurshernzpddodnshatshewaysweusedoer
gxstreogshdoiuralzersarlesaodtmbeaxnoiurpnaonxsheseareshrdfe
dxatirsifcrlslsxsublndtxtidataaodvtaldstdxpeessmeasurabnnkut
oisnsxsprihfuodpsasapxplogfhcitopddodnacrisxsiurnafeaoagghog
fkarshatamerdxasdecnhordslodvltabneafeshatshdoexsgdoeratliom
ustniwerdlsxslgmtstidasdsaytiyiushatshndhaevsnogeswefadnarer
eanthdyareserliusafeshnraremaoythdywhlloitknmexnashlyirloapm
irtspaoiftlmnkutkoiwshlsamerdxathdywhlnbemnxioshlsdaywnhathd
rbndausewehaznrhisdohiuniverfkaruodlyifourpiseivercitolhctao
dbdpscirdiosdgvdaywecimetipricnalmaododtithduntxtybvdrvaores
aofnanseprimlsessherndrlmloaldiosafewibfiutdigmasthatfirfart
ixiniogmavestraoglediurpindldxsweremaloayiuogoatliobuthoshew
irdvfhscrlpturnxhdldmehascimnxisnxaspdnddgfdlshsdgogsthdldme
hascimnxireafxelrmiurefeurhobgplrltxtirhixiseiurkntxxnbmlsti
ryticarxryhfrwardthatprexdiugbletxshatoibnrddeapasseditoring
doeratliosigdoeratlioshdgigflvdoprimlsnxhataevnareeuanannare
frexeafeanfdeserznachaornxipursunxhdlroyevnmeasurefhhapxplod
sxslfbeafxelrmhogshdbveasoessihfuroaldioweuoderstafeshatbvea
soesslpfnzeraglvdodlmustkneabfediurliubfnrhapfnzerkndoioeifs
hirtcutsirsetxtnholnirsnsxslshasoitbexdoshnuatheirshkfaloshd
arxnfnirshisewhiprkfersnlsurnxiwirkirsexekionyshnusnasuresfh
rlrhesaofnamerathdrlshaskndosherlsktakersthddiersthdmakersfh
shhobgsimednsnbratedbutmireiftdomeoafewimeoibscurehoshrdbeab
irwhihavndarrledusupshnsiobvtghnluathsiwardvprisunrltyaofnre
edimhfrusthdypackedupthdlrfkwxwibedfypissesxsliosafetravnsed
acrisxsidnaoslfpearchifaodwnlekfirusshnrtihledhosweatshipsao
dvnxtnedshewesxnfeuredshnsashifthdwhlpaoluniwedthdhamfearthe
irusshnrhftghsaodbdpedhopnaceslhkeciorirdafehntxtysburgoirma
feyafechzshaosdrsafeagaloshdsemeoafewimefptrtggledaodvacrlel
dndafewirkedldevnthdlrhafeswererawsishatwemlgmtnlveakntxxnbe
lenxhdysawamerdxaxasblbphnrthaoshdsumihfurhodpvlduanamblldio
gbreatershaoannthddpfxfkreoresfhblrthirweanthirfacldioshlsls
shrdiubfnrwecioshouetidayweremaloshdmistprisunriuspiwerfneoa
ldioioearthiurwirkersareoisnsxspriductlvnxhaowhdosdgscrlslsb
nhaoiurmhodvardoinesslovdoldzniuvbixidsafeservdxesoisnsxpfex
ededshaoshnrwerenastweekirnastmioshibeastyeariurcapaxdtyrema
hosufelmholshdlkutiurtlmeifstafehogpatfhpritndldogoarxriwlos
erestsaoluutldogfhoyopsnasaotdndlslifpshatldmehasxsurenypasx
sedvtarthogsidaywemustplckiursnsznsuulustiursenvesfhfafekngh
oagahoshewirkifremakhogamerlca
If you stare carefully at it you will find that it is semi-readable meaning that we probably just have 2 letters switched around in the key array. We can find which two letters by looking at the ciphertext and seeing what letters are getting distorted. The last 7 letters are amerlca which looks an awful lot like America, but the i is replaced with an l. So the problem is with the letter I.
'I' was one of the last letters we put in along with O, P and K. We could try switching I with each of these letters and seeing what kind of ciphertext results. We would find that when we switched I with O we got something readable.
BARCK
OMDEF
GHNLI
PQSTU
VWXYZ
When decrypted it produces:
myfelxlowcitizensxstandheretodayhumbledbythetaskbeforeusgrat
efulforthetrustyouhavebestowedmindfulofthesacrificesbornebyo
urancestorsithankpresidentbushforhisservicetoxournationaswel
lasthegenerosityandcoxoperationhehasshownthroughoutxthistran
sitionfortyfouramericanshavenowtakenthepresidentialoaththewo
rdshavebexenspokenduringrisingtidesofprosperityandthestilxlw
atersofpeaceyeteverysooftentheoathistakenamidstgatheringclou
dsandragingstormsatxthesemomentsamericahascarxriedonnotsimpl
ybecauseoftheskilxlorvisionofthoseinhighofficebutbecauseweth
epeoplehaveremainedfaithfultotheidealsofourforbearersandtrue
toourfoundingdocumentssoithasbexensoitmustbewiththisgenerati
onofamericansthatweareinthemidstofcrisisisnowxwelxlunderstox
odournationisatwaragainstafarxreachingnetworkofviolenceandha
tredoureconomyisbadlyweakenedaconseuenceofgrexedandirxrespon
sibilityonthepartofsomebutalsoourcollectivefailuretomakehard
choicesandpreparethenationforanewagehomeshavebexenlostiobssh
edbusinesxsesxshutteredourhealthcareistoocostlyourschoolsfai
ltoxomanyandeachdaybringsfurtherevidencethatthewaysweuseener
gystrengthenouradversariesandthreatenourplanetthesearetheind
icatorsofcrisisxsubiectxtodataandstatisticslessmeasurablebut
nolesxsprofoundisasapxpingofconfidenceacrosxsourlandanagging
fearthatamericasdeclineisinevitableandthatthenextgenerationm
ustloweritsxsightstodayisaytoyouthatthechalxlengeswefacearer
ealtheyareseriousandtheyaremanytheywillnotbemeteasilyorinash
ortspanoftimebutknowthisamericatheywillbemetonthisdaywegathe
rbecausewehavechosenhopeoverfearunityofpurposeoverconflictan
dxdiscordonthisdaywecometoproclaimanendtothepetxtygrievances
andfalsepromisestherecriminationsandwornoutdogmasthatforfart
oxolonghavestrangledourpoliticsweremainayoungnationbutinthew
ordsofscripturethetimehascometosetasidechildishthingsthetime
hascometoreafxfirmourenduringspiritxtochoxoseourbetxterhisto
rytocarxryforwardthatpreciousgiftxthatnobleideapassedonfromg
enerationtogenerationthegodgivenpromisethatalxlareeualallare
frexeandalldeserveachancetopursuetheirfulxlmeasureofhapxpine
sxsinreafxfirmingthegreatnessofournationweunderstandthatgrea
tnessisneveragivenitmustbeearnedouriourneyhasneverbeenoneofs
hortcutsorsetxtlingforlesxsithasnotbexenthepathforthefainthe
artedforthosewhopreferleisuretoworkorsexekonlythepleasuresof
richesandfameratherithasbeentherisktakersthedoersthemakersof
thingssomecelebratedbutmoreoftenmenandwomenobscureintheirlab
orwhohavecarriedusupthelongruggedpathtowardsprosperityandfre
edomforustheypackeduptheirfewxworldlypossesxsionsandtraveled
acrosxsoceansinsearchofanewlifeforustheytoiledinsweatshopsan
dsettledthewestenduredthelashofthewhipandplowedthehardearthf
orustheyfoughtandxdiedinplaceslikeconcordandgetxtysburgnorma
ndyandkhzshantiesandagainthesemenandwomenstruggledandsacrifi
cedandworkedtilxltheirhandswererawsothatwemightliveabetxterl
ifetheysawamericaxasbigxgerthanthesumofourindividualambition
sgreaterthanallthedifxferencesofbirthorwealthorfactionthisis
theiourneywecontinuetodayweremainthemostprosperouspowerfulna
tiononearthourworkersarenolesxsproductivethanwhenthiscrisisb
eganourmindsarenolessinventiveourgoxodsandservicesnolesxsnex
ededthantheywerelastweekorlastmonthorlastyearourcapacityrema
insundiminishedbutourtimeofstandingpatofprotectingnarxrowint
erestsandputtingoffunpleasantdecisionsthattimehasxsurelypasx
sedstartingtodaywemustpickourselvesupdustourselvesoffandbegi
nagaintheworkofremakingamerica

If you can't read it now, I can't help you.
Decrypting the Ciphertext from the previous post
by fortenforge, Dec 20, 2009, 1:31 AM
Okay, so, first I want you to copy the entire plaintext from the previous post. Then I want you to click this link. Paste the ciphertext into the big empty box under the words "Enter your ciphertext or comparison text here:" and click Submit. You should see a page with 3 tables. Look at the one whose cells are mostly green and whose title is "Most common digraphs". It will then list the frequency of the digraphs in the ciphertext and tell you which one appears the most. I have never actually told you which digraphs appear the most often in the English language, but we can figure out which ones do based on the monograph frequencies. The most common word in the English language is "THE" so we would expect the digraphs "TH" and "HE" to be very high up on the list. We could also say that "TH" would probably appear more often than "HE" because it also appears in many other words. You may notice that the table also gives us the frequency of the reversed digraph. This is extremely useful when trying to decrypt a ciphertext encrypted with playfair because if you examine the algorithm playfair uses for encryption you will realize that if "QP" gets encrypted as "KL", "PQ" must get encrypted as "LK". In the table, the darker the shade of green, the more appearances of the digraph. In the English language, there is one very common digraph whose reverse digraph is almost just as equally as common. This pair of letters is "ER" (or "RE"). If we look at the table the pair of digraph and reverse digraphs that are both very high in frequency are the pairs "CD" and "DC". Also, the highest frequency is the digraph "QL" and the second highest is "LM". We can now safely assume that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "DC" is "ER". Our goal is to find the correct key array, then we can decrypt the entire ciphertext. We can probably say that the last row of our 5 by 5 key table is "V W X Y Z" since these letters will probably not appear in our keyword. Now, we need to identify more digraphs before beginning to construct our key table. It is very likely that somewhere in the passage the phrase "THAT THE" will appear. If it does and is spaced like this: "TH AT TH E*" (* represents an unknown character) then we we know that in the ciphertext will be "QL ** QL **". We can look in our ciphertext for two QL's separated by 2 characters, and then assume that those two characters are AT. It turns out that "QL ** QL" appears 3 times in our ciphertext and in every single one of the times the ** was "CQ". We now can say that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "CQ" is "AT". We are now done with the first step, we have figured out what a sufficient number of digraphs are. Step 2, which will be the next post, is figuring out what the key array is based on this.
Archives








Shouts
Submit
27 shouts
Contributors
Tags
About Owner
- Posts: 200
- Joined: Jan 17, 2009
Blog Stats
- Blog created: Jun 21, 2009
- Total entries: 48
- Total visits: 126772
- Total comments: 16
Search Blog