Sorry your browser is not supported!

You are using an outdated browser that does not support modern web technologies, in order to use this site please update to a new browser.

Browsers supported include Chrome, FireFox, Safari, Opera, Internet Explorer 10+ or Microsoft Edge.

Geek Culture / Krypt Test (a bit of a challange)...

Author
Message
Killswitch
22
Years of Service
User Offline
Joined: 2nd Oct 2002
Location: School damnit!! Let me go!! PLEASE!!!
Posted: 22nd Feb 2005 05:52
Today I wrote my own encryption chiper, and as far as I can tell it seems to work (i.e. decrypting an encrypted string) 100% of the time. But I'd like a broader test of the chiper.

So if you would be so kind you you please download and test the encryption with the file attached to this post. It's not a pretty program (just type in the string you want to encrypt, hit enter, then repeat for the key), but it does work.

If you do find any problems with the chiper, or have any issues with it at all then please tell me so I can correct them. If you put your detials within a post then I *will* put a credit for you in the program as a tester. Scouts honor.

Cracking is also an issue, as well as speed. If you think you can crack an encrypted string, and can prove it, then again plase tell me.

Speed: well if it's slow (which in my testing it wasn't) then please state.

~It's a common mistake to make, the rules of the English langauge do not apply to insanity~

Attachments

Login to view attachments
1tg46
20
Years of Service
User Offline
Joined: 1st Feb 2004
Location: I dont know!
Posted: 12th Jun 2005 08:01
Seems like a good cipher. Would you mind elaborating on how the cipher is executed. (Basically what is the idea behind your code). I could not crack it with my collection of encryption algorithms.


Click sig for DB Network X
Dot Merix
21
Years of Service
User Offline
Joined: 15th Oct 2003
Location: Canada
Posted: 12th Jun 2005 08:04
Seems to work fine and fast for me.

- Merix



WindowsXP Home(Service pack 2), Athlon XP 2400+(2.1Ghz), 1GIG Ram, Ati Radeon 9800Pro 128MB.
JerBil
20
Years of Service
User Offline
Joined: 8th May 2004
Location: Somewhere along the Z axis...
Posted: 12th Jun 2005 11:33
Except if you do this...




-JerBil

Ad Astra Per Asper

Attachments

Login to view attachments
Killswitch
22
Years of Service
User Offline
Joined: 2nd Oct 2002
Location: School damnit!! Let me go!! PLEASE!!!
Posted: 12th Jun 2005 21:19 Edited at: 12th Jun 2005 21:19
Wow this is an old thread, are all three of you posts current or was it a server error that got this bumped? (This thread should've been locked for inactivity!).

~It's a common mistake to make, the rules of the English langauge do not apply to insanity~
1tg46
20
Years of Service
User Offline
Joined: 1st Feb 2004
Location: I dont know!
Posted: 13th Jun 2005 01:03 Edited at: 13th Jun 2005 01:10
I was googling this forum [yesterday] for threads on encryption, and this one sparked my interest, wasn't locked, and I was interested in the algorithm that was being used, so I posted. The not locking of this thread may have been a mistake of the forum.

Killswitch, would you mind elaborating on the algorithm used in this encryption. I would like to add the encryption algorithm to my Cryption Library.

Quote: "I was googling this forum [yesterday] for threads on encryption"

Actually this is a really good idea, I think I will do this again


Click sig for DB Network X
Killswitch
22
Years of Service
User Offline
Joined: 2nd Oct 2002
Location: School damnit!! Let me go!! PLEASE!!!
Posted: 13th Jun 2005 02:29
Well the encryption library I used in the program above is redundant, it's developed into a far stronger algorithm. For example:

The phrase:

DB Rocks!

Using the key:

1337

=

7V®¢š¤?WyydȦε

BUT This is not the only possible chiper text, the algorithm can generate several different chiper texts even when you use the same Key and text.

I can email you the code if you want, I'm a bit reluctant to post it directly here. It's not written in DarkBasic, it's written in PureBasic - the languages are pretty similar so it shouldn't be hard to convert it.

My email is:

evil_grunger@hotmail.com

Send me a mail (call it Encryption or something like that) and I'll forward on the code.

~It's a common mistake to make, the rules of the English langauge do not apply to insanity~
1tg46
20
Years of Service
User Offline
Joined: 1st Feb 2004
Location: I dont know!
Posted: 13th Jun 2005 07:15
Email is no good for me. We have AOL and I have many restrictions, so I can't use email. Is their another way (instant messaging is no good either).

May I ask why you are reluctant to post it here?


Click sig for DB Network X
Killswitch
22
Years of Service
User Offline
Joined: 2nd Oct 2002
Location: School damnit!! Let me go!! PLEASE!!!
Posted: 13th Jun 2005 18:25
I didn't really want to make the source that public, but I guess its my only option.

Encryption:



Decryption:



~It's a common mistake to make, the rules of the English langauge do not apply to insanity~
1tg46
20
Years of Service
User Offline
Joined: 1st Feb 2004
Location: I dont know!
Posted: 13th Jun 2005 23:11
Downloaded and saved, Thanks very much.

And I am assuming that a procedure is considered a function?


Click sig for DB Network X
Killswitch
22
Years of Service
User Offline
Joined: 2nd Oct 2002
Location: School damnit!! Let me go!! PLEASE!!!
Posted: 13th Jun 2005 23:38
Yep

~It's a common mistake to make, the rules of the English langauge do not apply to insanity~
1tg46
20
Years of Service
User Offline
Joined: 1st Feb 2004
Location: I dont know!
Posted: 14th Jun 2005 04:07 Edited at: 14th Jun 2005 04:15
Here is my translation so far of what I haveinto Visual Basic .NET)


The following parts I do not understand:
>With .s
>asc(with)
>repeat()
>endit
>;New

If you would mind giving me an idea of how those commands are suppose to work, it would help very much in translating your code to VB.NET(2003).

Regards,
1tg46

And to show my appreciation for posting the code here are two examples [in VB.NET] of two other encryption algorithms.


I use the two algorithms in combination with a few others to make an encryption that is extremely hard to break.
Anyone on the forums try decrypting this:
uÈ×÷(”ÝÏþ[®¬ÈúèèžÙËeøÆl££³ã×ÓôlÃìÇdíÊŸêôð¯kÏÑýevÆÕûdê×Ãûëüç?«Åþur¿½aï|¥ýñéðžßÅrºà¨ïqî?”òíõëTµÓýqµïÑþ

It uses the two algorithms, plus a one time pad that requires two passwords.
Password1=Dark Basic Professional
Password2=The Game Creators


Hint: It the OneTimePad is done more than once.......1024 times as a matter of fact.
Here is the order of the encryption
Rail Fence 2 Line
Polybius Checkerboard
OneTimePad...OneTimePad...

Notice: If you try to decrypt the message do it on the computer as it will take hours to do it other wise. I used my home made encryption software that did all the repetitive tasks of the one time pad so it took seconds to make the encryption.


Click sig for DB Network X
Killswitch
22
Years of Service
User Offline
Joined: 2nd Oct 2002
Location: School damnit!! Let me go!! PLEASE!!!
Posted: 14th Jun 2005 04:55
Quote: "
The following parts I do not understand:
>With .s
>asc(with)
>repeat()
>endit
>;New
"


>With.s is a string variable.

>Asc(With) this returns the ASCII value of the first character of With

>(This covers Endit as well) Repeat is one of a pair of commands (like do, loop in DB)

Example:

Repeat
;Code in here is repeated until the variable Endit=1
Until Endit=1

>;New with this I assume you mean ;\\New this is simply a comment to the code I made to remind myself where some new code I wrote started.

Hope that helps

~It's a common mistake to make, the rules of the English langauge do not apply to insanity~
1tg46
20
Years of Service
User Offline
Joined: 1st Feb 2004
Location: I dont know!
Posted: 14th Jun 2005 05:16
thanks I try to fix the code and then update it.


Click sig for DB Network X

Login to post a reply

Server time is: 2024-11-27 17:39:14
Your offset time is: 2024-11-27 17:39:14