Do you have adblock enabled?
If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(Wired)   All the NSA data the NSA leaked through Project Snowden is meant to backstop one lie: the Linux Tails operating system is a secure method of anonymous communication and not another NSA creation   (wired.com) divider line 30
    More: Interesting, idea, linux, NSA, operating systems, communications, OpenOffice, Linus Torvalds, Laura Poitras  
•       •       •

2847 clicks; posted to Geek » on 15 Apr 2014 at 10:01 AM (1 year ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



30 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread
 
2014-04-15 08:44:25 AM  
MSG NR 321 CK 194 0414 1244 BT
HAAIE WOWRE TPLEI MAHER ECEVS   PRAAY XCEKI SRTAT EERHS OAEPE
SGYNL SSETT AFLYO ODTOH AUSTE   OLURN OTLNA REHNT TLAOY HTANA
EEISY SCOLF YOBRT CISHH TNCSS   RTONY PYYAI FTAIR PANFT CDOGD
TUCUE MNITH PXCHN AETEE AFHKE   IWEIL TOTDE TYERS EMGR
AR K
 
2014-04-15 10:10:34 AM  
img.fark.net
 
2014-04-15 10:11:05 AM  
Looks like the Tails website is Farked.

/Or maybe NSA'd
 
2014-04-15 10:22:27 AM  

dittybopper: MSG NR 321 CK 194 0414 1244 BT
HAAIE WOWRE TPLEI MAHER ECEVS   PRAAY XCEKI SRTAT EERHS OAEPE
SGYNL SSETT AFLYO ODTOH AUSTE   OLURN OTLNA REHNT TLAOY HTANA
EEISY SCOLF YOBRT CISHH TNCSS   RTONY PYYAI FTAIR PANFT CDOGD
TUCUE MNITH PXCHN AETEE AFHKE   IWEIL TOTDE TYERS EMGR
AR K


every. single. time.
 
2014-04-15 10:40:42 AM  

olapbill: dittybopper: MSG NR 321 CK 194 0414 1244 BT
HAAIE WOWRE TPLEI MAHER ECEVS   PRAAY XCEKI SRTAT EERHS OAEPE
SGYNL SSETT AFLYO ODTOH AUSTE   OLURN OTLNA REHNT TLAOY HTANA
EEISY SCOLF YOBRT CISHH TNCSS   RTONY PYYAI FTAIR PANFT CDOGD
TUCUE MNITH PXCHN AETEE AFHKE   IWEIL TOTDE TYERS EMGR
AR K

every. single. time.


Yep.

Here's a blast from the past:

MSG NR 322 CK 146 0415 1440 BT
HTCHD NOSPX XTIRH YENOP AFPNI  RCTRX LDNIO VLNOO KSSFB EEEXX
OXIXN LEAXR IPAER XEXXS OOXSR  NNAXE TOINN IXEME EIVPN MOXTA
RAOXS EXWUO CNIXU TRSLG TXTAX  DDSTH CFOTU UXGNE LXUBM C
AR K


The plaintext is from here:   https://www.cia.gov/library/center-for-the-study-of-intelligence/kent - csi/vol4no2/html/v04i2a05p_0001.htm

The preamble is entirely my own.
 
2014-04-15 11:09:43 AM  

dittybopper: MSG NR 321 CK 194 0414 1244 BT
HAAIE WOWRE TPLEI MAHER ECEVS   PRAAY XCEKI SRTAT EERHS OAEPE
SGYNL SSETT AFLYO ODTOH AUSTE   OLURN OTLNA REHNT TLAOY HTANA
EEISY SCOLF YOBRT CISHH TNCSS   RTONY PYYAI FTAIR PANFT CDOGD
TUCUE MNITH PXCHN AETEE AFHKE   IWEIL TOTDE TYERS EMGR
AR K


my first guess was enigma, but i don't see any indication as to the starting rotor position.
 
2014-04-15 11:11:29 AM  
So Snowden used a Linux LiveCD to boot up his laptop?
 
2014-04-15 12:03:48 PM  

bmckenna: my first guess was enigma, but i don't see any indication as to the starting rotor position.


Your first guess was wrong.  If it had been Enigma, I would have follow the procedures outlined here:

http://users.telenet.be/d.rijmenants/en/enigmaproc.htm
 
2014-04-15 12:05:07 PM  
As a side note, once you get the plaintext, you'll understand why I wouldn't have done that with an Enigma simulator.
 
2014-04-15 12:47:31 PM  

bmckenna: dittybopper: MSG NR 321 CK 194 0414 1244 BT
HAAIE WOWRE TPLEI MAHER ECEVS   PRAAY XCEKI SRTAT EERHS OAEPE
SGYNL SSETT AFLYO ODTOH AUSTE   OLURN OTLNA REHNT TLAOY HTANA
EEISY SCOLF YOBRT CISHH TNCSS   RTONY PYYAI FTAIR PANFT CDOGD
TUCUE MNITH PXCHN AETEE AFHKE   IWEIL TOTDE TYERS EMGR
AR K

my first guess was enigma, but i don't see any indication as to the starting rotor position.


If he gave you that in the message, it wouldn't be secure, would it?
 
2014-04-15 01:12:04 PM  

Dwight_Yeast: bmckenna: dittybopper: MSG NR 321 CK 194 0414 1244 BT
HAAIE WOWRE TPLEI MAHER ECEVS   PRAAY XCEKI SRTAT EERHS OAEPE
SGYNL SSETT AFLYO ODTOH AUSTE   OLURN OTLNA REHNT TLAOY HTANA
EEISY SCOLF YOBRT CISHH TNCSS   RTONY PYYAI FTAIR PANFT CDOGD
TUCUE MNITH PXCHN AETEE AFHKE   IWEIL TOTDE TYERS EMGR
AR K

my first guess was enigma, but i don't see any indication as to the starting rotor position.

If he gave you that in the message, it wouldn't be secure, would it?


Enigma messages were sent with two 3-character plaintext codes - one to indicate the initial rotor start position, one to input with the initial rotor start position to give you the 3 character rotor start code for actually decoding the message. It's still secure because the rotors in use, their ring settings, and the plugs are all in a physical code book (not included with the message). In this case, the "physical code book" is in dittybopper's profile.
 
2014-04-15 01:19:11 PM  
Ooooh, that is some good conspiracy in the headline, subby.  Me likey.

Too bad the headline itself is a NSA cointel ploy.

Nice try.  I'll stick to my good ole, secure, infallible, method:  finding patterns in the sports section.

/the refs are all part of the conspiracy
 
2014-04-15 01:37:55 PM  
Who was submitter? Linux_Yes?
 
2014-04-15 01:57:46 PM  

dittybopper: As a side note, once you get the plaintext, you'll understand why I wouldn't have done that with an Enigma simulator.


I tried M-94, the straddling checkerboard with the one time pad (even though the page wasn't indicated as previously), and a VIC style cipher with the message number as a modular addition/subtraction key. Couldn't figure out if the message number was somehow relevant or not. *shrug*
 
2014-04-15 02:10:24 PM  

bmckenna: dittybopper: As a side note, once you get the plaintext, you'll understand why I wouldn't have done that with an Enigma simulator.

I tried M-94, the straddling checkerboard with the one time pad (even though the page wasn't indicated as previously), and a VIC style cipher with the message number as a modular addition/subtraction key. Couldn't figure out if the message number was somehow relevant or not. *shrug*


Here, you seem to have missed this in my profile:

Keywords for use in columnar transposition:
Single:   FLINTLOCK
Double: FLINTLOCK AIRPLANES
 
2014-04-15 02:22:09 PM  
BTW, the message number isn't significant.  That preamble:

MSG NR 321 CK 194 0414 1244 BT

Merely says this:

MSG NR 321 <--- Message number 321.  It's just a serial number.
CK 194  <--- The number of letters in the message, a "check" so you know you got the whole message.
0414  <--- The date, but a mistake as it should read 0415 (April 15th)
1244  <--- The time the message was sent, in UTC.
BT  <--- This is a common Morse code prosign that means "Break Text", it's to separate the preamble from the body of the message.

At the end of the message, we have this:

AR K

Which are the Morse prosigns for "End of Message", and "Over to you", respectively.

BTW, some methods use group counts instead of actual number of letters, generally with systems where you fill out the rest of the group for consistency, and in some cases instead ofark they will use GR, but not always.

Also, you can have another part to the preamble, a precedence indicator, to let you know how important a message is.  I generally avoid that sort of thing because it lets anyone else monitoring know how important the message is also, so the better thing to do from a security standpoint is to make that part of the encrypted message itself.

In general, the preamble is just the administrivia necessary for the handling of the message between entities.
 
2014-04-15 02:47:53 PM  

dittybopper: bmckenna: dittybopper: As a side note, once you get the plaintext, you'll understand why I wouldn't have done that with an Enigma simulator.

I tried M-94, the straddling checkerboard with the one time pad (even though the page wasn't indicated as previously), and a VIC style cipher with the message number as a modular addition/subtraction key. Couldn't figure out if the message number was somehow relevant or not. *shrug*

Here, you seem to have missed this in my profile:

Keywords for use in columnar transposition:
Single:   FLINTLOCK
Double: FLINTLOCK AIRPLANES


I forgot to mention I had tried that as well, both single and double. 253796814 and 148752639. Unless it goes through the straddling checkerboard THEN goes through columnar transposition?
 
2014-04-15 02:58:18 PM  

dittybopper: CK 194  <--- The number of letters in the message, a "check" so you know you got the whole message.


So if somebody set this arbitrarily large do you tell them all of your secrets?
 
2014-04-15 03:05:11 PM  

The Beatings Will Continue Until Morale Improves: dittybopper: CK 194  <--- The number of letters in the message, a "check" so you know you got the whole message.

So if somebody set this arbitrarily large do you tell them all of your secrets?


Limited to 64k, though.
 
2014-04-15 03:10:57 PM  
TOO MANY SECRETS
 
2014-04-15 03:19:15 PM  

bmckenna: I forgot to mention I had tried that as well, both single and double. 253796814 and 148752639. Unless it goes through the straddling checkerboard THEN goes through columnar transposition?


Remember that if I use FLINTLOCK as the first transposition key and AIRPLANES as the second, you've got to use AIRPLANES first and then FLINTLOCK to decode it.

Also, take out all the whitespace (obviously).
 
2014-04-15 03:29:39 PM  

bmckenna: The Beatings Will Continue Until Morale Improves: dittybopper: CK 194  <--- The number of letters in the message, a "check" so you know you got the whole message.

So if somebody set this arbitrarily large do you tell them all of your secrets?

Limited to 64k, though.


Yeah, well, it's not like I have that many secrets.  A HiDef video of my sex life would fit comfortably within that limit.
 
2014-04-15 03:30:20 PM  
THEONLYREALWAYTOENSURETHATTHENSAISNTREADINGTHEPLAI
NTEXTOFYOURMESSAGESISTOKEEPTHEPLAINTEXTOFFOFANYELE
CTRONICDEVICESTOPTHATWAYTHEYAREFORCEDTOBREAKYOURME
SSAGESCRYPTANALYTICALLYWHICHISMUCHHARDERSTOP
 
2014-04-15 03:30:55 PM  
Oh, and it's just transposition.  If it went through the straddling checkerboard, it would be numbers.

Which, btw, is a very powerful technique.
 
2014-04-15 03:31:37 PM  

durkadurka: THEONLYREALWAYTOENSURETHATTHENSAISNTREADINGTHEPLAI
NTEXTOFYOURMESSAGESISTOKEEPTHEPLAINTEXTOFFOFANYELE
CTRONICDEVICESTOPTHATWAYTHEYAREFORCEDTOBREAKYOURME
SSAGESCRYPTANALYTICALLYWHICHISMUCHHARDERSTOP


Give that man a cee-gar!
 
2014-04-15 03:34:38 PM  
and your other one:

CHIEFXOFXPOLICEXLIEUTENANTXUNDERCOVERXIMPRUDENTLYX
WORKSXFORXENGLISHXSTOPXCONVENIENTXTOXOBTAINXHISXRE
TURNXLISBONXSTOPXHEXCANXDAMAGEXUSXSTOPXARMANDO
 
2014-04-15 03:40:52 PM  

bmckenna: the straddling checkerboard with the one time pad (even though the page wasn't indicated as previously)


Wait, how could you try that?  The straddling checkerboard and OTP only output numbers, at least as I have it in my profile.
 
2014-04-15 03:43:30 PM  

dittybopper: bmckenna: I forgot to mention I had tried that as well, both single and double. 253796814 and 148752639. Unless it goes through the straddling checkerboard THEN goes through columnar transposition?

Remember that if I use FLINTLOCK as the first transposition key and AIRPLANES as the second, you've got to use AIRPLANES first and then FLINTLOCK to decode it.

Also, take out all the whitespace (obviously).


dittybopper: Oh, and it's just transposition.  If it went through the straddling checkerboard, it would be numbers.

Which, btw, is a very powerful technique.


Something must've been off in my attempt because I definitely did that decryption and came up with nonsense. Worked when I tried it a second time. Busy day at work so I'm not terribly surprised.

Technically, couldn't you take the existing plaintext message, convert to numbers via the straddling checkerboard, then run the columnar transposition (which due to the fact that some letters are one digit numbers and some are two digit numbers would provide different transposition than performing it on the letters), then re-encrypt using the straddling checkerboard? (My point was that it could go through the straddling checkerboard but not be numbers at the end).
 
2014-04-15 03:45:34 PM  

dittybopper: bmckenna: the straddling checkerboard with the one time pad (even though the page wasn't indicated as previously)

Wait, how could you try that?  The straddling checkerboard and OTP only output numbers, at least as I have it in my profile.


Not like the straddling checkerboard is a one-way conversion, no? I converted from encrypted text to numbers from the checkerboard then applied the modular arithmetic with the one time pad.
 
2014-04-15 04:16:54 PM  

bmckenna: dittybopper: bmckenna: I forgot to mention I had tried that as well, both single and double. 253796814 and 148752639. Unless it goes through the straddling checkerboard THEN goes through columnar transposition?

Remember that if I use FLINTLOCK as the first transposition key and AIRPLANES as the second, you've got to use AIRPLANES first and then FLINTLOCK to decode it.

Also, take out all the whitespace (obviously).

dittybopper: Oh, and it's just transposition.  If it went through the straddling checkerboard, it would be numbers.

Which, btw, is a very powerful technique.

Something must've been off in my attempt because I definitely did that decryption and came up with nonsense. Worked when I tried it a second time. Busy day at work so I'm not terribly surprised.

Technically, couldn't you take the existing plaintext message, convert to numbers via the straddling checkerboard, then run the columnar transposition (which due to the fact that some letters are one digit numbers and some are two digit numbers would provide different transposition than performing it on the letters), then re-encrypt using the straddling checkerboard? (My point was that it could go through the straddling checkerboard but not be numbers at the end).


Yeah, you could, except that you'll sometimes have a period or a slash in your ciphertext, which is a major pain in the ass if you're reading it out loud or sending it via Morse.
 
Displayed 30 of 30 comments

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »
Advertisement
On Twitter






In Other Media


  1. Links are submitted by members of the Fark community.

  2. When community members submit a link, they also write a custom headline for the story.

  3. Other Farkers comment on the links. This is the number of comments. Click here to read them.

  4. Click here to submit a link.

Report