Weird Geo

by Anto0110, Apr 20, 2025, 9:24 PM

In a trapezium $ABCD$, the sides $AB$ and $CD$ are parallel and the angles $\angle ABC$ and $\angle BAD$ are acute. Show that it is possible to divide the triangle $ABC$ into 4 disjoint triangle $X_1. . . , X_4$ and the triangle $ABD$ into 4 disjoint triangles $Y_1,. . . , Y_4$ such that the triangles $X_i$ and $Y_i$ are congruent for all $i$.

standard Q FE

by jasperE3, Apr 20, 2025, 6:27 PM

Is the geometric function injective?

by Project_Donkey_into_M4, Apr 20, 2025, 6:23 PM

A non-degenerate triangle $\Delta ABC$ is given in the plane, let $S$ be the set of points which lie strictly inside it. Also let $\mathfrak{C}$ be the set of circles in the plane. For a point $P \in S$, let $A_P, B_P, C_P$ be the reflection of $P$ in sides $\overline{BC}, \overline{CA}, \overline{AB}$ respectively. Define a function $\omega: S \rightarrow \mathfrak{C}$ such that $\omega(P)$ is the circumcircle of $A_PB_PC_P$. Is $\omega$ injective?

Note: The function $\omega$ is called injective if for any $P, Q \in S$, $\omega(P) = \omega(Q) \Leftrightarrow P = Q$
This post has been edited 1 time. Last edited by Project_Donkey_into_M4, Yesterday at 6:24 PM

Equal Distances in an Isosceles Setting

by mojyla222, Apr 20, 2025, 5:05 AM

Let $ABC$ be an isosceles triangle with $AB=AC$. The circle $\omega_1$, passing through $B$ and $C$, intersects segment $AB$ at $K\neq B$. The circle $\omega_2$ is tangent to $BC$ at $B$ and passes through $K$. Let $M$ and $N$ be the midpoints of segments $AB$ and $AC$, respectively. The line $MN$ intersects $\omega_1$ and $\omega_2$ at points $P$ and $Q$, respectively, where $P$ and $Q$ are the intersections closer to $M$. Prove that $MP=MQ$.

Proposed by Hooman Fattahi

3 knightlike moves is enough

by sarjinius, Mar 9, 2025, 3:38 PM

An ant is on the Cartesian plane. In a single move, the ant selects a positive integer $k$, then either travels
  • $k$ units vertically (up or down) and $2k$ units horizontally (left or right); or
  • $k$ units horizontally (left or right) and $2k$ units vertically (up or down).
Thus, for any $k$, the ant can choose to go to one of eight possible points.
Prove that, for any integers $a$ and $b$, the ant can travel from $(0, 0)$ to $(a, b)$ using at most $3$ moves.

Dear Sqing: So Many Inequalities...

by hashtagmath, Oct 30, 2024, 5:52 AM

I have noticed thousands upon thousands of inequalities that you have posted to HSO and was wondering where you get the inspiration, imagination, and even the validation that such inequalities are true? Also, what do you find particularly appealing and important about specifically inequalities rather than other branches of mathematics? Thank you :)

D860 : Flower domino and unconnected

by Dattier, May 26, 2024, 9:03 AM

Let G be a grid of size m*n.

We have 2 dominoes in flowers and not connected like here
https://i.servimg.com/u/f60/20/07/09/74/domino15.png
Determine a necessary and sufficient condition on m and n, so that G can be covered with these 2 kinds of dominoes.

winning strategy, vertices of regular n-gon

by parmenides51, Sep 4, 2022, 5:01 PM

The vertices of a regular polygon with $N$ sides are marked on the blackboard. Ana and Beto play alternately, Ana begins. Each player, in turn, must do the following:
$\bullet$ join two vertices with a segment, without cutting another already marked segment; or
$\bullet$ delete a vertex that does not belong to any marked segment.
The player who cannot take any action on his turn loses the game. Determine which of the two players can guarantee victory:
a) if $N=28$
b) if $N=29$

numbers at vertices of triangle / tetrahedron, consecutive and gcd related

by parmenides51, Sep 4, 2022, 4:59 PM

a) A positive integer is written at each vertex of a triangle. Then on each side of the triangle the greatest common divisor of its ends is written. It is possible that the numbers written on the sides be three consecutive integers, in some order?
b) A positive integer is written at each vertex of a tetrahedron. Then, on each edge of the tetrahedron is written the greatest common divisor of its ends . It is possible that the numbers written in the edges are six consecutive integers, in some order?

red squares in a 7x7 board

by parmenides51, Sep 4, 2022, 4:44 PM

In a $7\times7$ board, some squares are painted red. Let $a$ be the number of rows that have an odd number of red squares and let $b$ be the number of columns that have an odd number of red squares. Find all possible values of $a+b$. For each value found, give a example of how the board can be painted.
This post has been edited 3 times. Last edited by parmenides51, Dec 10, 2022, 3:39 AM

Finally decrypting it

by fortenforge, Jan 3, 2010, 2:56 AM

We now can say that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "CQ" is "AT".

When trying to find the key array, there are a few things you need to keep in mind.

1. Remember that though the keyword is a word, any repeated letters in it will be deleted, so you should be looking to form a group of letters at the first row of the array that looks like it could be a word, but is not a word exactly.

2. When the person who wrote the message made the key array, after he chose the key word, he put the rest of the letters in alphabetical order to the end of the array, this means that "V W X Y Z" is probably the last line of the array and that the letter G will definitely go somewhere in the first 3 rows of the array. If, when making the array, you see a string of consecutive letters, like " F G H I" you are probably on the right track.

3. You want to assume that the digraphs you know form a rectangle with the letters at the corners. Let us say that you knew that the letters QL represented the letters TH,

draw a rectangle like this:

H L

Q T

We have no idea of the number of columns between Q and T, nor the number of rows between H and Q. but we do know that H and Q and L and T are on the same column and Q and T and H and L are on the same row. I drew the rectangle with H in the top left corner because it is alphabetically first. (Not e that all 4 could have been on the same row or column but that is not likely). We also know that LM and HE form a rectangle. We already have L and H in our grid so we just have to add L and M.

M E
H L
Q T

M and E technically could have gone under H and L but since E comes before H, above seems likely.

Next one, CD is RE. Since D comes directly before E in the alphabet, I'm gonna put D directly before E in our key array, once I've put D, C and R will follow:

RC
M DE
H L
Q T

Note that we could also have realized that C is on the same column as T using this next pair: CQ is AT. We have already put C, Q, and T in our array, so we just need to put the A t o complete the rectangle.

ARC
MDE
H L
Q T

Our first string of consecutive letters is "DE" so it seems that the key word ends at M and the rest of the letters are filled in alphabetically. F is not a common letter so we can assume temporarily that F comes after the E. We can also say that G is after F. And we can write VWXYZ in the last row.

ARC
MDEF
GH L
Q T
VWXYZ

We have completed enough of the ciphertext to just fill in the remaining letters in alphabetical order:

BARCI
KMDEF
GHNLO
PQSTU
VWXYZ

Looking at the key word: BARCIKM, it would look a lot more like a word if K and I were switched:

BARCK
IMDEF
GHNLO
PQSTU
VWXYZ

We could try decrypting the ciphertext now and find that it does not look very readable:

myfkevniwcdllydosxstaoifernxidayhthksnlkythdtaskknhfreusbvat
kfnehfrthdtrustyiuhaznknstiwedmlfeoynifthdsacrledxesnobfnkyi
uraodnstirslshaokpresldeosbupmhfbmlsservdxnxixiubfatlioaswns
nasthdhnodrisltyaodcixiperatliibdhaspmiwosmbiugmiutxshlstrao
slldiohfrtyfiuramerlcafphaznoiwtakdoshnuresldeoslaniathshdwi
mfpmavnkexdospikdodurlogrlsloglddesiforisperdlyafeshesldevnw
atersifoeadnrnxnznrysifhxnoshdiashlstakeoamldvsgathdrlogcniu
dvaofmaghobgtirmsatxshesemimdotsamerdxahascarxrlediooitslmpn
ybndausefhshesclevnirvlslioifthisehodggmfheldnbutbndausewesh
nueipndhaveremalodfnalshoyntithdpdeaepfhiurfirknarersafetrue
tiiurfiufehofgicumdotssidlhasbexdosidlmustknwlshshlshnodrald
iofhamerdxaosthatwearehoshempdstfhcrlslslsoiwxweevenfeerstix
idiubfatliohsatwaragalfptafarxreacdgogodtwirkifulisnoreafeha
trediurecioimylsbadfyweakeoddacifpeudodnfhbvexedaodprxrespio
slbllhtyioshnuartifsimnkutansiiurcinsnctlvkfalenretimakehamf
rhildnsafeprnuarnxhdoaldiohfraodwahnhimepmavnkexdonistlibspm
edbuslodsxsesxpmutxnrediurhdanshcarelstiicistnyiurschiinsfal
ntiximaoyafeearhdaybrlogsfurshernzpddodnshatshewaysweusedoer
gxstreogshdoiuralzersarlesaodtmbeaxnoiurpnaonxsheseareshrdfe
dxatirsifcrlslsxsublndtxtidataaodvtaldstdxpeessmeasurabnnkut
oisnsxsprihfuodpsasapxplogfhcitopddodnacrisxsiurnafeaoagghog
fkarshatamerdxasdecnhordslodvltabneafeshatshdoexsgdoeratliom
ustniwerdlsxslgmtstidasdsaytiyiushatshndhaevsnogeswefadnarer
eanthdyareserliusafeshnraremaoythdywhlloitknmexnashlyirloapm
irtspaoiftlmnkutkoiwshlsamerdxathdywhlnbemnxioshlsdaywnhathd
rbndausewehaznrhisdohiuniverfkaruodlyifourpiseivercitolhctao
dbdpscirdiosdgvdaywecimetipricnalmaododtithduntxtybvdrvaores
aofnanseprimlsessherndrlmloaldiosafewibfiutdigmasthatfirfart
ixiniogmavestraoglediurpindldxsweremaloayiuogoatliobuthoshew
irdvfhscrlpturnxhdldmehascimnxisnxaspdnddgfdlshsdgogsthdldme
hascimnxireafxelrmiurefeurhobgplrltxtirhixiseiurkntxxnbmlsti
ryticarxryhfrwardthatprexdiugbletxshatoibnrddeapasseditoring
doeratliosigdoeratlioshdgigflvdoprimlsnxhataevnareeuanannare
frexeafeanfdeserznachaornxipursunxhdlroyevnmeasurefhhapxplod
sxslfbeafxelrmhogshdbveasoessihfuroaldioweuoderstafeshatbvea
soesslpfnzeraglvdodlmustkneabfediurliubfnrhapfnzerkndoioeifs
hirtcutsirsetxtnholnirsnsxslshasoitbexdoshnuatheirshkfaloshd
arxnfnirshisewhiprkfersnlsurnxiwirkirsexekionyshnusnasuresfh
rlrhesaofnamerathdrlshaskndosherlsktakersthddiersthdmakersfh
shhobgsimednsnbratedbutmireiftdomeoafewimeoibscurehoshrdbeab
irwhihavndarrledusupshnsiobvtghnluathsiwardvprisunrltyaofnre
edimhfrusthdypackedupthdlrfkwxwibedfypissesxsliosafetravnsed
acrisxsidnaoslfpearchifaodwnlekfirusshnrtihledhosweatshipsao
dvnxtnedshewesxnfeuredshnsashifthdwhlpaoluniwedthdhamfearthe
irusshnrhftghsaodbdpedhopnaceslhkeciorirdafehntxtysburgoirma
feyafechzshaosdrsafeagaloshdsemeoafewimefptrtggledaodvacrlel
dndafewirkedldevnthdlrhafeswererawsishatwemlgmtnlveakntxxnbe
lenxhdysawamerdxaxasblbphnrthaoshdsumihfurhodpvlduanamblldio
gbreatershaoannthddpfxfkreoresfhblrthirweanthirfacldioshlsls
shrdiubfnrwecioshouetidayweremaloshdmistprisunriuspiwerfneoa
ldioioearthiurwirkersareoisnsxspriductlvnxhaowhdosdgscrlslsb
nhaoiurmhodvardoinesslovdoldzniuvbixidsafeservdxesoisnsxpfex
ededshaoshnrwerenastweekirnastmioshibeastyeariurcapaxdtyrema
hosufelmholshdlkutiurtlmeifstafehogpatfhpritndldogoarxriwlos
erestsaoluutldogfhoyopsnasaotdndlslifpshatldmehasxsurenypasx
sedvtarthogsidaywemustplckiursnsznsuulustiursenvesfhfafekngh
oagahoshewirkifremakhogamerlca

If you stare carefully at it you will find that it is semi-readable meaning that we probably just have 2 letters switched around in the key array. We can find which two letters by looking at the ciphertext and seeing what letters are getting distorted. The last 7 letters are amerlca which looks an awful lot like America, but the i is replaced with an l. So the problem is with the letter I.

'I' was one of the last letters we put in along with O, P and K. We could try switching I with each of these letters and seeing what kind of ciphertext results. We would find that when we switched I with O we got something readable.

BARCK
OMDEF
GHNLI
PQSTU
VWXYZ

When decrypted it produces:

myfelxlowcitizensxstandheretodayhumbledbythetaskbeforeusgrat
efulforthetrustyouhavebestowedmindfulofthesacrificesbornebyo
urancestorsithankpresidentbushforhisservicetoxournationaswel
lasthegenerosityandcoxoperationhehasshownthroughoutxthistran
sitionfortyfouramericanshavenowtakenthepresidentialoaththewo
rdshavebexenspokenduringrisingtidesofprosperityandthestilxlw
atersofpeaceyeteverysooftentheoathistakenamidstgatheringclou
dsandragingstormsatxthesemomentsamericahascarxriedonnotsimpl
ybecauseoftheskilxlorvisionofthoseinhighofficebutbecauseweth
epeoplehaveremainedfaithfultotheidealsofourforbearersandtrue
toourfoundingdocumentssoithasbexensoitmustbewiththisgenerati
onofamericansthatweareinthemidstofcrisisisnowxwelxlunderstox
odournationisatwaragainstafarxreachingnetworkofviolenceandha
tredoureconomyisbadlyweakenedaconseuenceofgrexedandirxrespon
sibilityonthepartofsomebutalsoourcollectivefailuretomakehard
choicesandpreparethenationforanewagehomeshavebexenlostiobssh
edbusinesxsesxshutteredourhealthcareistoocostlyourschoolsfai
ltoxomanyandeachdaybringsfurtherevidencethatthewaysweuseener
gystrengthenouradversariesandthreatenourplanetthesearetheind
icatorsofcrisisxsubiectxtodataandstatisticslessmeasurablebut
nolesxsprofoundisasapxpingofconfidenceacrosxsourlandanagging
fearthatamericasdeclineisinevitableandthatthenextgenerationm
ustloweritsxsightstodayisaytoyouthatthechalxlengeswefacearer
ealtheyareseriousandtheyaremanytheywillnotbemeteasilyorinash
ortspanoftimebutknowthisamericatheywillbemetonthisdaywegathe
rbecausewehavechosenhopeoverfearunityofpurposeoverconflictan
dxdiscordonthisdaywecometoproclaimanendtothepetxtygrievances
andfalsepromisestherecriminationsandwornoutdogmasthatforfart
oxolonghavestrangledourpoliticsweremainayoungnationbutinthew
ordsofscripturethetimehascometosetasidechildishthingsthetime
hascometoreafxfirmourenduringspiritxtochoxoseourbetxterhisto
rytocarxryforwardthatpreciousgiftxthatnobleideapassedonfromg
enerationtogenerationthegodgivenpromisethatalxlareeualallare
frexeandalldeserveachancetopursuetheirfulxlmeasureofhapxpine
sxsinreafxfirmingthegreatnessofournationweunderstandthatgrea
tnessisneveragivenitmustbeearnedouriourneyhasneverbeenoneofs
hortcutsorsetxtlingforlesxsithasnotbexenthepathforthefainthe
artedforthosewhopreferleisuretoworkorsexekonlythepleasuresof
richesandfameratherithasbeentherisktakersthedoersthemakersof
thingssomecelebratedbutmoreoftenmenandwomenobscureintheirlab
orwhohavecarriedusupthelongruggedpathtowardsprosperityandfre
edomforustheypackeduptheirfewxworldlypossesxsionsandtraveled
acrosxsoceansinsearchofanewlifeforustheytoiledinsweatshopsan
dsettledthewestenduredthelashofthewhipandplowedthehardearthf
orustheyfoughtandxdiedinplaceslikeconcordandgetxtysburgnorma
ndyandkhzshantiesandagainthesemenandwomenstruggledandsacrifi
cedandworkedtilxltheirhandswererawsothatwemightliveabetxterl
ifetheysawamericaxasbigxgerthanthesumofourindividualambition
sgreaterthanallthedifxferencesofbirthorwealthorfactionthisis
theiourneywecontinuetodayweremainthemostprosperouspowerfulna
tiononearthourworkersarenolesxsproductivethanwhenthiscrisisb
eganourmindsarenolessinventiveourgoxodsandservicesnolesxsnex
ededthantheywerelastweekorlastmonthorlastyearourcapacityrema
insundiminishedbutourtimeofstandingpatofprotectingnarxrowint
erestsandputtingoffunpleasantdecisionsthattimehasxsurelypasx
sedstartingtodaywemustpickourselvesupdustourselvesoffandbegi
nagaintheworkofremakingamerica :)

If you can't read it now, I can't help you.

Decrypting the Ciphertext from the previous post

by fortenforge, Dec 20, 2009, 1:31 AM

Okay, so, first I want you to copy the entire plaintext from the previous post. Then I want you to click this link. Paste the ciphertext into the big empty box under the words "Enter your ciphertext or comparison text here:" and click Submit. You should see a page with 3 tables. Look at the one whose cells are mostly green and whose title is "Most common digraphs". It will then list the frequency of the digraphs in the ciphertext and tell you which one appears the most. I have never actually told you which digraphs appear the most often in the English language, but we can figure out which ones do based on the monograph frequencies. The most common word in the English language is "THE" so we would expect the digraphs "TH" and "HE" to be very high up on the list. We could also say that "TH" would probably appear more often than "HE" because it also appears in many other words. You may notice that the table also gives us the frequency of the reversed digraph. This is extremely useful when trying to decrypt a ciphertext encrypted with playfair because if you examine the algorithm playfair uses for encryption you will realize that if "QP" gets encrypted as "KL", "PQ" must get encrypted as "LK". In the table, the darker the shade of green, the more appearances of the digraph. In the English language, there is one very common digraph whose reverse digraph is almost just as equally as common. This pair of letters is "ER" (or "RE"). If we look at the table the pair of digraph and reverse digraphs that are both very high in frequency are the pairs "CD" and "DC". Also, the highest frequency is the digraph "QL" and the second highest is "LM". We can now safely assume that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "DC" is "ER". Our goal is to find the correct key array, then we can decrypt the entire ciphertext. We can probably say that the last row of our 5 by 5 key table is "V W X Y Z" since these letters will probably not appear in our keyword. Now, we need to identify more digraphs before beginning to construct our key table. It is very likely that somewhere in the passage the phrase "THAT THE" will appear. If it does and is spaced like this: "TH AT TH E*" (* represents an unknown character) then we we know that in the ciphertext will be "QL ** QL **". We can look in our ciphertext for two QL's separated by 2 characters, and then assume that those two characters are AT. It turns out that "QL ** QL" appears 3 times in our ciphertext and in every single one of the times the ** was "CQ". We now can say that "QL" is "TH", "LM" is "HE" and "CD" is "RE" and "CQ" is "AT". We are now done with the first step, we have figured out what a sufficient number of digraphs are. Step 2, which will be the next post, is figuring out what the key array is based on this.

A guide to the science of secrecy

avatar

fortenforge
Archives
Shouts
Submit
  • Good website!

    by bluegoose101, Aug 5, 2021, 6:28 PM

  • uh-huh, a great place here

    by fenchelfen, Sep 1, 2019, 11:30 AM

  • uh, yeah he is o_O

    by SonyWii, Oct 8, 2010, 2:11 PM

  • dude i think you're my roommate from camp :O

    by themorninglighttt, Aug 29, 2010, 10:06 PM

  • what i'm still not a contrib D:

    by SonyWii, Aug 6, 2010, 2:20 PM

  • I see what you did there

    by Jongy, Aug 1, 2010, 11:52 PM

  • omg, apparently you like cryptography; and apparently I'm not a contribb D:

    by SonyWii, Jul 26, 2010, 9:48 PM

  • Thank You

    by fortenforge, Jan 17, 2010, 6:35 PM

  • Wow this is a really cool blog

    by alkjash, Jan 16, 2010, 7:04 PM

  • Hi :)

    by fortenforge, Jan 7, 2010, 12:12 AM

  • Hi :)

    by Richard_Min, Jan 5, 2010, 9:29 PM

  • Hi :) :)

    by fortenforge, Jan 3, 2010, 10:14 PM

  • HELLO FORTENFORGE I AM THE PERSON SITTING NEXT TO YOU IN IDEAMATH

    by ButteredButNotEaten, Dec 24, 2009, 4:19 AM

  • @dragon96 Not if you celebrate Christmas with neon lights
    @batteredbutnotdefeated Sure, You are now a contributer

    by fortenforge, Dec 20, 2009, 4:39 AM

  • I too share a love for cryptography and cryptanalysis, may I be a contrib?

    by batteredbutnotdefeated, Dec 20, 2009, 2:38 AM

  • The green is too bright for Christmas. :P

    by dragon96, Dec 20, 2009, 2:12 AM

  • I thought I'd change the colors for the Holidays :lol:

    by fortenforge, Dec 13, 2009, 10:53 PM

  • hi, some "simple" cryptography here: http://www.artofproblemsolving.com/Forum/weblog_entry.php?t=317795

    by phiReKaLk6781, Dec 12, 2009, 3:46 AM

  • Yeah, that is binary, for modern cryptography, most text is converted to binary first and then algorithm's for encryption are preformed on the binary rather than the English letters. The text is converted using the ASCII table or UNICODE.

    by fortenforge, Oct 13, 2009, 10:33 PM

  • Whoa, I love your background! Is that binary?

    by pianogirl, Oct 13, 2009, 8:34 PM

  • Sure, I'll add you as a contributer...

    by fortenforge, Oct 2, 2009, 4:44 AM

  • May I make a post on one cipher I made up? (It's a good code for science people! *hint hint*)

    by dragon96, Oct 2, 2009, 4:04 AM

  • Nice blog, this is interesting... :lol:

    and guess who i am :ninja:

    by Yoshi, Sep 21, 2009, 4:02 AM

  • Thanks :lol:

    by fortenforge, Sep 17, 2009, 1:33 AM

  • Very interesting blog. Nice!

    by AIME15, Sep 16, 2009, 5:21 PM

  • When you mean 'write' do you mean like programming? Much of cryptography has to do with programming and most modern cryptographers are excellent programmers because modern complex ciphers are difficult to implement by hand.

    See if you can write a program for the substitution cipher. The user should be able to enter the key and the message. I know it is possible to do it in pretty much any language because I was able to do it in c.

    by fortenforge, Aug 7, 2009, 8:17 PM

  • Hello. I don't know much about advanced cryptography but I did write a Caeser Chipher encrypter and decrypter!

    by Poincare, Jul 31, 2009, 8:55 PM

27 shouts
Tags
About Owner
  • Posts: 200
  • Joined: Jan 17, 2009
Blog Stats
  • Blog created: Jun 21, 2009
  • Total entries: 48
  • Total visits: 126772
  • Total comments: 16
Search Blog
a