Thread: Viginere Cipher

Results 1 to 10 of 10
  1. #1
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,304
    Reputation
    170
    Thanks
    2,203
    My Mood
    Flirty

    Viginere Cipher

    Well I have been studying cryptology for a few days, and it took me a while, but I realized the XOR cipher is nothing but a Vignere cipher except in this case we already know what XORs with what to equal what.

    Now I finally understand how to apply a frequency analysis to capture the key.

    I'll explain:

    Plaint text: THE SUN AND THE MAN IN THE MOON
    I will remove the spaces for purposes I'll explain later...

    Plaintext:THESUNANDTHEMANINTHEMOON
    Cipher text: DPRYEVNTNBUKWIAOXBUKWWBT
    Key: KING

    NOTE: The ciphertext is not XORed as I wanted you all to see the characters.

    Anyway the key is reused which means it is possible to count the coincidences of any repeated characters.... I will demonstrate.

    KINGKINGKINGKINGKINGKINGKING - that's the repeated key
    THESUNANDTHEMANINTHEMOON
    DPRYEVNTNBUKWIAOXBUKWWBT - the sequence BUK comes up twice.

    So now we know that the distance between the two BUK's must be a multiple of the key length. We start at the first B and count... BUKWIAOX.. before we get to the next B and we find that the length of this space is 8 which means that the key length is a multiple of 8.

    So the key can either 1,2,4,or 8 which drastically narrows down our search. Now we know that the key can only be 8 chars long at most. Now if we had the table of substitution it would be possible to try different combinations of letters till we found one that made sense.

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  2. The Following 4 Users Say Thank You to why06 For This Useful Post:

    Hell_Demon (12-11-2009),lalakijilp (12-10-2009),Synns (12-10-2009),Void (12-10-2009)

  3. #2
    ilovecookies's Avatar
    Join Date
    Oct 2009
    Gender
    male
    Location
    In the C++ Section
    Posts
    321
    Reputation
    10
    Thanks
    67
    My Mood
    Shocked
    Is this here to brainfuck us noobs?
    Quote Originally Posted by Jules Winnfield View Post
    I am the tyranny of evil men, and you are all the weak. But i'm trying Ringo,i'm trying real hard, to become the shepherd.
    excuse me miss, would you kindly reflect some photons off the epidermis covering your sternum directly into the camera iris or vacate the proximity immediately
    [IMG]https://i882.photobucke*****m/albums/ac23/miki_d420/RealizingYoureALeecher2copy.jpg[/IMG]









  4. #3
    Disturbed's Avatar
    Join Date
    Feb 2009
    Gender
    male
    Posts
    10,472
    Reputation
    1267
    Thanks
    2,587
    Quote Originally Posted by ilovecookies View Post
    Is this here to brainfuck us noobs?
    I think so.

    All I understood is something about knowing the the key to some code can't be more then 8 chars....


  5. #4
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,304
    Reputation
    170
    Thanks
    2,203
    My Mood
    Flirty
    Quote Originally Posted by ilovecookies View Post
    Is this here to brainfuck us noobs?
    Definitely.
    I actly got the little example from another site. Google Vignere cipher... you can't miss it. What I really want to do is learn just some common encryption algorithms used in application software. And how to examine codes to determine what kind of encryptions they're using. Otherwise I'm just shooting in the dark.

    Anyway I had some trouble trying to understand exactly how this method works. But I thought the site did a good job of explaining it. I was actually going to correlate it to XOR and come up with my own example, but their appears to be a slight flaw in my code. I'll fix it then post some more examples as well as smart (non-brute force) ways of figuring out a Vignere cipher.

    I'll I explain it in a lil more detail once I get my code to work and can get some realistic examples.

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  6. The Following User Says Thank You to why06 For This Useful Post:

    Hell_Demon (12-11-2009)

  7. #5
    Hell_Demon's Avatar
    Join Date
    Mar 2008
    Gender
    male
    Location
    I love causing havoc
    Posts
    3,976
    Reputation
    343
    Thanks
    4,320
    My Mood
    Cheeky
    I <3 kthxbai
    Ah we-a blaze the fyah, make it bun dem!

  8. #6
    Helios283's Avatar
    Join Date
    Aug 2009
    Gender
    male
    Location
    127.0.0.1
    Posts
    102
    Reputation
    10
    Thanks
    2
    My Mood
    Sneaky
    Brainfucked.

  9. #7
    falzarex's Avatar
    Join Date
    Apr 2008
    Gender
    male
    Location
    here
    Posts
    417
    Reputation
    14
    Thanks
    145
    Hey can you explain a mersenne twister? Lol coz there are endless possibilities of applications in gamehacking

  10. #8
    why06's Avatar
    Join Date
    Jul 2009
    Gender
    male
    Location
    IBM
    Posts
    4,304
    Reputation
    170
    Thanks
    2,203
    My Mood
    Flirty
    Quote Originally Posted by falzarex View Post
    Hey can you explain a mersenne twister? Lol coz there are endless possibilities of applications in gamehacking
    Hmmm... I'm not familiar with that, but I do know it relies on chaos theory. That is that an extremely small change in the initial conditions can lead to a radically different affect. Using very simple equations it's possible to create mathematical graphs of infinite complexity. I don't have a good backing in the equations so I can't elaborate. But they are pretty neat.

    I actually have a fractal image as my wallpaper, which are images created by these equations. Look at this:
    Beautiful right. There is a strong argument that nature stores things like biological data in this format. So you see a relatively small instruction can make an infinitely complex structure and yet repetition is still found (.aka symmetry) as with the Madelbrot video, one of the most famous fractals.

    Oh about your Mersenne twister. I would have to look up the specific equation, but I don't see the point since you can most likely just call rand without knowing how it works. This is can be used for encryption I suppose, to provide a fake randomness, but you have to remember the results of the random number generator are completely predictable, if you have the right initial information.

    There. I think I did a good job of not answering your question.

    Another 1 just 4 fun:
    Last edited by why06; 12-13-2009 at 08:55 AM.

    "Every gun that is made, every warship launched, every rocket fired signifies, in the final sense, a theft from those who hunger and are not fed, those who are cold and are not clothed. This world in arms is not spending money alone. It is spending the sweat of its laborers, the genius of its scientists, the hopes of its children. The cost of one modern heavy bomber is this: a modern brick school in more than 30 cities. It is two electric power plants, each serving a town of 60,000 population. It is two fine, fully equipped hospitals. It is some fifty miles of concrete pavement. We pay for a single fighter plane with a half million bushels of wheat. We pay for a single destroyer with new homes that could have housed more than 8,000 people. This is, I repeat, the best way of life to be found on the road the world has been taking. This is not a way of life at all, in any true sense. Under the cloud of threatening war, it is humanity hanging from a cross of iron."
    - Dwight D. Eisenhower

  11. #9
    falzarex's Avatar
    Join Date
    Apr 2008
    Gender
    male
    Location
    here
    Posts
    417
    Reputation
    14
    Thanks
    145
    Yeah apparently there are some examples online
    the pokemon engine is one good example(I know ROFL) it combines current time readings with the twister equation to form infinitely random stuff(don't know much) but apparently some people managed to reverse the process and create a god-tool that can determine or generate certain special events that are normally random
    So it is reversible but extremely time consuming

  12. #10
    char32308's Avatar
    Join Date
    Jun 2009
    Gender
    male
    Location
    PA
    Posts
    6
    Reputation
    10
    Thanks
    0
    My Mood
    Sneaky
    Quote Originally Posted by why06 View Post
    Definitely.
    I actly got the little example from another site. Google Vignere cipher... you can't miss it. What I really want to do is learn just some common encryption algorithms used in application software. And how to examine codes to determine what kind of encryptions they're using. Otherwise I'm just shooting in the dark.

    Anyway I had some trouble trying to understand exactly how this method works. But I thought the site did a good job of explaining it. I was actually going to correlate it to XOR and come up with my own example, but their appears to be a slight flaw in my code. I'll fix it then post some more examples as well as smart (non-brute force) ways of figuring out a Vignere cipher.

    I'll I explain it in a lil more detail once I get my code to work and can get some realistic examples.


    Lol he is to smart for me i dont get it ahhhhhhhhhhhh

Similar Threads

  1. Black Cipher
    By SpaceMan in forum Combat Arms Discussions
    Replies: 28
    Last Post: 05-09-2011, 03:20 PM
  2. [Detected] NOOB H4X Black Cipher
    By NOOB in forum Combat Arms Hacks & Cheats
    Replies: 519
    Last Post: 05-08-2011, 06:29 PM
  3. The NexonGuard file inside of Black Cipher
    By BustaRap in forum Combat Arms Mod Discussion
    Replies: 15
    Last Post: 05-05-2011, 08:26 AM
  4. Black cipher detected and report generated
    By my80chevette in forum Combat Arms Help
    Replies: 7
    Last Post: 05-04-2011, 04:19 PM
  5. Cypher/Cipher Anyone come in..
    By HackPack in forum Art & Graphic Design
    Replies: 6
    Last Post: 08-06-2009, 11:24 PM