[HARDWARE] ongoing work

Russell Hemery rhemery at powerup.com.au
Wed Apr 28 11:49:49 EDT 1999


At 04:15 PM 27/04/99 -0400, you wrote:
>On Tue, 27 Apr 1999, Matthew Smart wrote:
>
>> But RC5 is a symmetric algorithm, so decrypting is just as easy as
>> encrypting.  And you only need to decrypt/encrypt the first block (64 bits)
>> and compare it against the ASCII representation of "The ", which is the
>> first part of "The unknown message is: ".
>> 
>> So encrypting "The " and comparing against the given cyphertext should be
>> the same as decrypting the first block of the cyphertext and comparing
>> against "The ".

An idea.. (from a complete novice in cryptography)

There appears to be 15 known characters at the start of the "hidden message"
t,h,e,u,n,k,o,w,m,s,a,g,i,: and space. with multiples of some.

Statistically which are the least common of these characters in the English
language? What if a search was mounted for a pattern matching least common
part of the "known" message.

Is this what bovine is doing or would this possibly work? "The" seems
awfully common to search for.

Cheers

Russell

--
To unsubscribe, send 'unsubscribe hardware' to majordomo at lists.distributed.net



More information about the Hardware mailing list