Code Book Cipher Cracked 72
AssFace writes: "The Code Book challenge -- I believe 10,000 pounds was the reward for it, and it consisted of 10 stages of increasing difficulty that mimicked the evolution of cryptography throughout history -- was cracked and there is a fantasitc description all at http://www.simonsingh.com/. Goodbye Simon Singh." It's a cool read, too -- both Singh's own writeup, and that of the Swedes who broke the cipher. Congratulations to the winners.
Stop! (Score:2)
________
hard to read (Score:1)
Ah, but what about... (Score:1)
Can They Do CueCat? (Score:1)
Unleash this team on the CueCat encryption! No, no, it's not that easy. They'd have to fight off shark-toothed lawyers with code books, while simultaneously engaging the vicious mind games of money-hungry legislators who pass laws such as the DCMA -- this is no walk in the park!
On a related topic... (Score:2)
This is flat out wrong. (Score:3)
Its odd... (Score:3)
I guess because you cant arrest the person who broke it from the Ukraine without a lot of trouble. Bah, if only we could get The Man out of the computer world, then it would be a true match between encryptors and decryptors. Would be amusing to make the Internet a scary place again.
Re:hard to read (Score:1)
Too bad - I was working on it (Score:1)
Goodbye $10K prize money? No Way. (Score:1)
By this do you mean "Goodbye $10K in prize money?"
I'll bet that's not the way he see's it. In fact I'll bet he is thinking more along the lines of:
"Hello $250K of free advertising for my book. Yipee! Yippee!
Re:Goodbye $10K prize money? No Way. (Score:1)
Hmmmm... one might even say, "Good Buy, Simon Singh!"
Re:Uhh, their explaination skips a stage. (Score:2)
Did I miss something about stage 5? (Score:1)
--
Re:HAHAHA (MOD UP!) (Score:1)
________
stage 10 (Score:3)
Re:Did I miss something about stage 5? (Score:4)
Re:Goodbye $10K prize money? No Way. (Score:1)
----------------------------------------
Re:Goodbye $10K prize money? No Way. (Score:2)
Re:stage 10 (Score:1)
-------------------------------------------
Re:stage 10 (Score:2)
Re:What the (Score:1)
Cool... (Score:1)
-Moondog
Thanks -- it's in the PDF but not in HTML (Score:1)
Thanks for the PDF suggestion.
--
Re:stage 10 (Score:2)
Not only that, but they had their distributed software running on hundreds of workstations. Most ordinary people don't have access to that all on their own either. Not yet.
Of course if we're talking ordinary, most ordinary people don't have the right software or the right education to do stage 9 or 10. Not yet ;)
Re:hard to read (Score:1)
Prize Money (Score:1)
Re:Did I miss something about stage 5? (Score:4)
So it wasn't so much decrypting as finding a key text that fit the numbers. It's modeled off the Beale cyphers, which are three lists of numbers that supposedly point to gold. The second one used the Declaration of Independance as a code text. No one can find the first or third, as I recall.
It's virtually a one time pad if you wrote the key text yourself, and in all other respects, is more a matter of luck in finding the text then skills/techniques used in any of the other ciphers (frequency analysis, familiarity with the cipher) and so forth) - Most groups didn't get this one till much later. Most skipped it for quite a while.
I was looking for some text that might be based in Oxford myself, like a text of Newton's or something. Suck.
Yes (Score:1)
Ah well...immense fun while it lasted (Score:5)
For those of you who haven't read this book but are interested in cryptography, I can't urge you enough to read it. The challenge at the back is especially enticing. I'm not sure if it will lose its appeal now that the answers are published and known, but for me there was something absolutely special about breaking the codes and knowing that I was one of the few people in the world to have done it.
I solved stages 1 - 6 and 9 (I was on the 2nd team to brute force the Stage 9 DES cipher). Stage 7 was the ADFGVX cipher used in WWI and Stage 8 was the infamouse Enigma cipher used in WWII. For those who haven't had a crack at this, it's certainly worth it. IMO there is nothing quite like revealing a code piece by piece. I was privelaged or lucky enough to decipher some of the hints on the eGroups message board and be one of the first few to solve Stage 5, and the elation from seeing--for the first time--what only a few people have ever seen is nearly indescribable.
In summary, this was a wonderful book and an excellent adventure. Best wishes to the Swedish smarties who actually cracked Stage 10 (they had to pick between brute forcing triple DES or 512-bit RSA) and to everyone else who contributed along the way. It has certainly been an excellent experience!
--
It's the author of the article.. (Score:1)
Re:Stop! (Score:1)
Re:stage 10 (Score:1)
Sure they have. Just write a variant of distributed.net as a trojan/virus thingy, then make a deal with one of the top 10 pr0n sites. Thousands of workstations in a flash! :-)
Re:hard to read (Score:1)
Unfortunately, though, I found this stuff so fascinating that I couldn't resist! I'm a sucker for ciphers, I wrote a Vinegre cipher encoder/decoder in BASIC like 8 years ago...
This just builds the table, because I'm sure no one wants to see all this old code, but I'm just getting nostalgic here. I guess I was 14, reading through some tiny book on ciphers throughout history, wondering how the modern stuff worked, and later why PGP was so slow on my 386SX25...
DIM ALPHABET$(25, 25)
FOR Y = 0 TO 25
FOR Z = 0 TO 25
A = Y + Z + 65
IF Y + Z > 25 THEN A = Y + Z - 26 + 65
ALPHABET$(Y, Z) = CHR$(A)
NEXT Z
NEXT Y
---
pb Reply or e-mail; don't vaguely moderate [ncsu.edu].
Re:Uhh, their explaination skips a stage. (Score:2)
The most interesting part is.... (Score:5)
This is the first time "normal" computer hardware has been used to break a 512-bit RSA key.
The first public break [rsalabs.com] of an RSA key of this size was performed using 224 CPU hours on a Cray C916 whilst the team that cracked the codebook puzzles took just 13 days [codebook.org] on a quad-Alpha Compaq beast.
Don't forget, before the export rules were changed around 90%+ of all "secure" SSL transactions on the internet were using 512-bit keys. Scary, huh?
--
Re:Ah well...immense fun while it lasted (Score:2)
Re:Did I miss something about stage 5? (Score:1)
Sorry, don't mean to be too picky, but Newton is more usually associated with Cambridge than Oxford. Y'know, what with him studying at Caius College, and holding the same maths chair at Cambridge now occupied by Stephen Hawking.
Re:Did I miss something about stage 5? (Score:1)
"... what with him studying at Caius College ..."
Sorry, don't mean to be too picky ;) but Newton actually went to Trinity, not Caius. Many of his books, including his own annotated first edition copy of Principia, are on view at the Wren Library there.
Hawking, however, does indeed go to Caius. I think.
Bit-slicing for stage 9 (Score:1)
I was most intrigued by the descriptiong of the bi-slicing technique that the Swedish team used in their Stage 9 key search. They realised that the DES algorithm could be implemented using only boolean operators (AND, OR, NOT etc.) and so caluclated 32 keys simultaneously by using each bit of a 32-bit word to represent a different key.
So basically they were searching 32 keys at once, which is a very clever use of resources. Does anyone know if the Distributed.Net clients use similar techniques to speed up the RC5 key searches, or is it impossible to implement RC5 using the boolean operators?
Re:stage 10 (Score:3)
Yeah. The guy who, earlier in this discussion, referred to number 5 as almost a one-time pad (i.e. provably secure encryption) had it right. At least some of us know algorithms for factoring, even if we don't have the computer power to do it and possibly don't know the best algorithms; trying to find the right text to decode #5 must have been hellish for everyone who tried, whether they had a network of computers or an Atari 400 (my first computer at 1.79 MHz...). If, as would be reasonable for anyone trying to REALLY encrypt something, Singh had selected a random sequence of letters instead, the code would have been unbreakable.
I found the trouble people had with #5 illuminating: public key cryptography isn't everything. If you can distribute your key secretly, or not distribute it at all, symmetric cryptography can be pretty powerful. I guess that's part of why public key methods are chiefly used to distribute keys for DES and the like. (The other reason being computational complexity---would anyone use RSA to encrypt a reasonably long message?)
FWIW I've been really impressed with Singh as a science writer who tries to get it right. There aren't that many of them (and one of my hobbies is poking holes in popular accounts of science and mathematics.)
Where are the problems? (Score:1)
Re:So here I go (Score:1)
is? IS??
whats the point of having IMHO when you dont use it. Its just an opinion. I prefer white on black, as it means theres no flashing monitor to give me a headache!
Re:Cool stuff... (Score:1)
Re:Ah well...immense fun while it lasted (Score:1)
Cynic (Score:1)
BO-ring! (Score:1)
--
Re:The most interesting part is.... (Score:2)
Compaq was cool enough to take em up on it and lent them 13 days on a quad machine. That's alot of CPU that compaq donated for PR. mind you, I don't know if I think it necessarily qualifies as "normal", but still.
Will the Real Simon Singh please stand up? (Score:2)
What's interesting about this is that they used the cryptography from the book as a form of authentication! Sort of like a digital signature in reverse. If he was the real Simon Singh, he would have already known the plaintext to #10, and could use that to identify himself. And if he weren't, then he would presumably be from a team that had already solved it, so why bother calling them? (Yeah, I know, they might have solved every one but #5, but the same challenge/response works for all the problems, and strengthens the authentication.)
Re:Where are the problems? (Score:2)
-----------------------------------------
Re:Cynic (Score:1)
Re:Where are the problems? (Score:1)
-----------------------------------------
Re:stage 10 (Score:1)
4GB is not that extraordinary any more. Sure, you're not likely to see 4GB in too many people's desktop PCs, but is that the operative definition of "ordinary"? I'd say that any computer that the manufacturer can ship to you off an assembly line because they make thousands like it is ordinary, and that covers a lot of machines with a lot more than 4GB.
Your sig... (Score:1)
Mary used cryptography, she kept the key in escrow. Everything that Mary said, the feds were sure to know.
I think it flows a bit better....
Re:Did I miss something about stage 5? (Score:1)
Cambridge either way though.
Re:Will the Real Simon Singh please stand up? (Score:1)
If you purchase the book (Score:1)
Re:Will the Real Simon Singh please stand up? (Score:1)
Re:Where are the problems? (Score:1)
(BTW i cracked the encryption on your mailing list name!)
;)
Re:Where are the problems? (Score:1)
--------------------------------------------
Re:Did I miss something about stage 5? (Score:1)
That, and I'm still working on the old Poe Cipher. Too many goals, and no dates.. suck.
Re:Where are the problems? (Score:1)
(I dont normally complain about spelling!!)
I`m now waiting for egroups to email me the registration number. Its taking its time - hope i get it before the 15th!!
A.
Re:Will the Real Simon Singh please stand up? (Score:1)
---
From: Fredrik Almgren
Subject: RE: Nervous
Date: Fri, 6 Oct 2000 11:07:44 +0200
I have just talked on the phone with an English-speaking gentleman who said he was Simon Singh. He started off the call with a short discussion on how he was going to make me believe that he was indeed Simon Singh. After some rambling from my side, he said that the first part of the plaintext for Stage 10 consisted of fourteen words and that words 5 and 14 rhyme. At that point, I felt about ready to accept that he was really who he claimed.
----
Re:stage 10 (Score:1)
Re:Where are the problems? (Score:1)
-------------------------------------------
Re:Your sig... (Score:1)
Sorry, I think the original flows much better. But I do like losing the "And" for the third line.
--
Simon Singh on TV (Score:1)
There's also a competetion where you can win a trip to Eygpt if you crack the code.
Easy... (Score:1)
I confided in Paul Leyland, an encryption expert working for Microsoft
Well *no wonder* it was cracked!
Michael
...another comment from Michael Tandy.
Re:Easy... (Score:1)
I confided in Paul Leyland, an encryption expert working for Microsoft
Well *no wonder* it was cracked!
8-)
They actually did it the hard way. I spoke with Frederik to see how they cracked the code.
I'm impressed with their achievement.
Paul
Re:Bit-slicing for stage 9 (Score:1)
Birham's paper in
An explanation of the technique and source [darkside.com.au]
Looks like the Swedish team used these older ideas.
The second link also indicates that Distributed.Net clients use this method for DES, but no info on RC5.
Re:Ah well...immense fun while it lasted (Score:2)
Thanks in advance!
Re:Cool stuff... (Score:1)
Re:Where are the problems? (Score:1)
Cheers again,
alex.