Encryption key and encrypted text

  • Thread starter Thread starter mathal
  • Start date Start date
  • Tags Tags
    Encryption Text
Click For Summary

Discussion Overview

The discussion revolves around a puzzle involving an encryption key and encrypted text. Participants are tasked with deciphering the text using the provided key, with hints about the algorithm used for encryption being revealed over time. The scope includes exploratory reasoning and problem-solving related to cryptography.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested
  • Mathematical reasoning

Main Points Raised

  • Some participants propose that the encryption key is 'encryption key' and the messages are plain text, suggesting that there is enough information to solve the puzzle.
  • Others mention that a brute force method could be applied to the encryption, indicating that the puzzle can be solved without additional hints.
  • A later reply questions whether the hints provided are sufficient for solving the puzzle without resorting to brute force.
  • Participants express that the algorithm used for encryption will be revealed later, and that the first post contains enough information to begin solving the puzzle.
  • Some participants note that the formatting of the text in Courier New font may assist in visualizing the encryption more clearly.
  • There are repeated assertions that the puzzle can be solved with the information initially provided, despite the offer of additional hints and solutions later on.

Areas of Agreement / Disagreement

Participants generally agree that the puzzle can be solved with the information given, but there is contention regarding the necessity and effectiveness of brute force methods versus other approaches. The discussion remains unresolved as to the specific algorithm and the best method for solving the encryption.

Contextual Notes

Participants have noted that the hints provided may not be straightforward and that the success of solving the puzzle may depend on the interpretation of the clues given. There are also references to future hints and solutions that may influence the problem-solving process.

Who May Find This Useful

This discussion may be of interest to those engaged in cryptography, puzzle-solving, or mathematical reasoning, particularly in the context of encryption techniques and algorithms.

mathal
Messages
77
Reaction score
0
encryption key


u ffhyaxwm vm dhxc wtvsybpvnsgfgintvsg zwkp tsvwtvsyxjwio

nppmnrgtvjirqesnf uwzlcqksneqtfjycqb


cwqownkyupj

to clarify - the encryption key is 'encryption key' and the
messages are plain text. I will be impressed if anyone solves this.
In a few weeks I'll add the spoiler answer and then the puzzle becomes
what is the simple algorithm used to encrypt the text. There is enough information
here to solve the puzzle but it is not precisely in plain sight. (the last line has nothing to do with spoiler 'invisible' or otherwise, clues.

Have fun, or otherwise
mathal
 
Physics news on Phys.org
mathal said:
encryption key


u ffhyaxwm vm dhxc wtvsybpvnsgfgintvsg zwkp tsvwtvsyxjwio

nppmnrgtvjirqesnf uwzlcqksneqtfjycqb


cwqownkyupj

to clarify - the encryption key is 'encryption key' and the
messages are plain text. I will be impressed if anyone solves this.
In a few weeks I'll add the spoiler answer and then the puzzle becomes
what is the simple algorithm used to encrypt the text. There is enough information
here to solve the puzzle but it is not precisely in plain sight. (the last line has nothing to do with spoiler 'invisible' or otherwise, clues.

Have fun, or otherwise
mathal

On the 31 of July I'll reveal the last line which doesn't reveal any 'inside' information but does give data that can be used to start or even finish solving the puzzle by 'brute force' solution models. The text in the complete solution provides the algorythm - if you think about it in the right way.This and all other solution lines will be spoiler 'invisible'. Finally, if no one get's it I'll post the algorythm. i.e. the solution. again in spoiler invisible format.

mathal
 
mathal said:
On the 31 of July I'll reveal the last line which doesn't reveal any 'inside' information but does give data that can be used to start or even finish solving the puzzle by 'brute force' solution models. The text in the complete solution provides the algorythm - if you think about it in the right way.This and all other solution lines will be spoiler 'invisible'. Finally, if no one get's it I'll post the algorythm. i.e. the solution. again in spoiler invisible format.

mathal
cwqownkyupj
encryption key
describe itThe letters in the three rows should line up in columns. The key is longer than the message in this line. For other lines the key is just repeated-no space between the ending 'y' and beginning 'e'.

There is enough here to try a blunt force method on the encryption. There has always been enough information to solve this encryption without the blunt force approach- i.e. without any spoilers. If no one provides the answer and description of the method (in a spoiler) I'll add another hint with the next line up decrypted in a week -August 7.

mathal
 
This is the same as the last spoiler except I found out Courier New font lines up the characters nicely in columns. and a further size edit which the other spoilers will use.


cwqownkyupj
encryption key
describe it


enjoy. mathal
 
mathal said:
encryption key


u ffhyaxwm vm dhxc wtvsybpvnsgfgintvsg zwkp tsvwtvsyxjwio

nppmnrgtvjirqesnf uwzlcqksneqtfjycqb


cwqownkyupj

to clarify - the encryption key is 'encryption key' and the
messages are plain text. I will be impressed if anyone solves this.
In a few weeks I'll add the spoiler answer and then the puzzle becomes
what is the simple algorithm used to encrypt the text. There is enough information
here to solve the puzzle but it is not precisely in plain sight. (the last line has nothing to do with spoiler 'invisible' or otherwise, clues.

Have fun, or otherwise
mathal

This is the second and third line solved. For those that want to solve the puzzle using a brute force method this gives you a bit more to work with. Again I will repeat, the puzzle can be solved with just the information in the first post- but.
mathal

with elaboration it works with bytes
encryption keyencryption keyencryption key
nppmnrgtvjirqesnf uwzlcqksneqtfjycqb

describe it
encryption key
cwqownkyupj

 
mathal said:
encryption key


u ffhyaxwm vm dhxc wtvsybpvnsgfgintvsg zwkp tsvwtvsyxjwio

nppmnrgtvjirqesnf uwzlcqksneqtfjycqb


cwqownkyupj

to clarify - the encryption key is 'encryption key' and the
messages are plain text. I will be impressed if anyone solves this.
In a few weeks I'll add the spoiler answer and then the puzzle becomes
what is the simple algorithm used to encrypt the text. There is enough information
here to solve the puzzle but it is not precisely in plain sight. (the last line has nothing to do with spoiler 'invisible' or otherwise, clues.

Have fun, or otherwise
mathal


In this spoiler the complete solution of the three lines is given. The first line is the 'telling all' line that should lead someone hopefully to understand how the lines are encrypted with the key 'encryption key'.
If no one describes the solution -the algorithm by Labor Day Weekend I'll provide it, again in spoiler format. Once you see the algorithm you should see that the puzzle could be solved with the information I gave in the first post repeated above.


u ffhyaxwm vm dhxc wtvsybpvnsgfgintvsg zwkp tsvwtvsyxjwio
encryption keyencryption keyencryption keyencryption keye
my logical function the all or neither encrypts the lines

nppmnrgtvjirqesnf uwzlcqksneqtfjycqb
encryption keyencryption keyencryption key
with elaboration it works with bytes

cwqownkyupj
encryption key
describe it





mathal
 
Here is the explanation of how the encryption works plus a generalized formula for you to use as you will.
mathal
It is the dimension of the field of play that is crucial.
There are 26 letters in the alphabet and a space is used to separate the words. 26+1=27=3^3.
interpreting letters as numbers in trinary form.
In base 3 or trinary numbers the digits for the number are the 'tri-bit' (0-2) times the power of 3 for that digit.3^2=9,3^1=3,3^0=1
The alphabet as trinary numbers is.-space = 000
a-001 b-002 c-010 d-011 e-012 f-020 g-021 h-022 i-100 j-101 k-102 l-110 m-111 n-112 o-120 p-121 q-122 r-200 s-201 t-202 u-210 v-211 w-212 x-220 y-221 z-222
The algorythm uses an XOR-like logic.
XOR truth table
0 XOR 0 = 0 1 XOR 0 = 1
0 XOR 1 = 1 1 XOR 1 = 0
Given input of two bits A and B with the XOR result being C, A further XOR of C with A results in B or C XOR B resulting in A.
The 3 values are a complementary set-any two returns the third element in the set.
In Binary this complementary relationship can be represented by two sets of bits.
1-000-input of 0 and 0 returns 0.
2-011-input of any two of these 3 bits returns the third bit.
I refer to this complimentary relationship of bits as triplets for the rest of this post. From here I extrapolated to how a trinary system 'might' work in a similar manner.
I started with the triplet 012 -input any 2 and the result is the third.
That left 000 111 and 222 as the forced other triplets.
if the bits match then the output is the same, if they differ the remaining alternative bit is returned. (all or neither)
describe it
encryption

d=011..e=012..s=201..c=010..r=200..i=100
e=012..n=112..c=010..r=200..y=221..p=121
c=010..w=212..q=122..0=120..w=212..n=112

The last line is the beginning of the last line in the encrypted text in the puzzle. Decryption works exactly the same way. Encrypted text + encryption key returns the decrypted text. Or -decrypted and encrypted text returns 'encryption key'...
Since posting this puzzle I read an article on quantum computers and encryption.(Scientific American I think) The author made a point that I pursued. He implied that data encryption could use the MOD 2 function (With binary input).
If you look at the XOR truth table above you can see that mod 2 of the sum of the 2 inputs is the result of the XOR function.
The rest of this post is what I've elaborated since posting the puzzle.
The general formula for generating succesive encrypted bits in number system N using a MOD operator.
C=(2*N+Offset-A-B) MOD N
(2*N to guarantee a positive MOD result in any programming language.)
A and B are the input bits - (from data and encryption key), C is the resulting bit. 'Offset' is a value 0<= Offset < N
Looking at the sums of the columns in the puzzle example above you can see that the columns all add to 0, 3 or 6 (because offset is 0 for this puzzle)
For the Binary XOR function in this MOD function model.
N= 2.Offset = 0. N=2 Offset =1 generates the same values as the NOT XOR function.
Remember, the sum for the two input bits plus the return bit is a multiple of n-your number system plus the offset.
Clearly the offset can be adjusted bit by bit by a second key or a different position in the key and further befuddle attempts to decrypt the data. (I'm sure encryption algorythms would use all of this, bit-swapping, and more)
I said the trinary with elaboration works with bytes. Trinary numbers don't fit together cleanly with bytes. Nonetheless a byte encrypted with a 6-bit trinary key fits inside a 6 bit trinary number 3^6-1=729-1 (max) which is less than 10 bit binary numbers 2^10-1=1024-1 (max). The encrypted data then would be 10 binary bits to represent 1 former byte now in it's encrypted trinary form as a binary number. As a bit stream every 5 bytes would represent 4 'values'.
(Hexidecimal numbers -base 16 and base 4 numbers- Quadral? fit into bytes like a hand in a glove.)
I pointed out that the XOR function is equivalent to A+B mod 2. The formula I gave uses (2*N-A-B + Offset). Binary is the only number system where (A+B+Offset) MOD N works as an encryption/decryption device, that is, it gives the same result as the general formula.
Addendum: In the puzzle a 'brute force' attack on the encryption, given enough data, would resolve into valid letter triplets asociated with the solution.For example matching letters in the encrypted text and the 'encryption key' always yeild the same letter, similarly any two different letters always have the same third letter asociated with them. In the puzzle (N=3 Offset=0) there are 144 letter triplets - counting the obvious aaa bbb...etc. Without these obvious ones you get 117 other triplets. There are 135 letter triplet in each of the other 2 offsets. This Addendum is all irrelevant trivia.
 

Similar threads

  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 5 ·
Replies
5
Views
3K
  • · Replies 3 ·
Replies
3
Views
4K
  • · Replies 13 ·
Replies
13
Views
4K