Return to Unfiction unforum
 a.r.g.b.b 
FAQ FAQ   Search Search 
 
Welcome!
New users, PLEASE read these forum guidelines. New posters, SEARCH before posting and read these rules before posting your killer new campaign. New players may also wish to peruse the ARG Player Tutorial.

All users must abide by the Terms of Service.
Website Restoration Project
This archiving project is a collaboration between Unfiction and Sean Stacey (SpaceBass), Brian Enigma (BrianEnigma), and Laura E. Hall (lehall) with
the Center for Immersive Arts.
Announcements
This is a static snapshot of the
Unfiction forums, as of
July 23, 2017.
This site is intended as an archive to chronicle the history of Alternate Reality Games.
 
The time now is Tue Nov 12, 2024 8:06 pm
All times are UTC - 4 (DST in action)
View posts in this forum since last visit
View unanswered posts in this forum
Calendar
 Forum index » Diversions » Perplex City Puzzle Cards » PXC: Silver Puzzle Cards
[PUZZLE] #251 - Silver - The Thirteenth Labour
Moderators: AnthraX101, bagsbee, BrianEnigma, cassandra, Giskard, lhall, Mikeyj, myf, poozle, RobMagus, xnbomb
View previous topicView next topic
Page 23 of 35 [518 Posts]   Goto page: Previous 1, 2, 3, ..., 21, 22, 23, 24, 25, ..., 33, 34, 35  Next
Author Message
hturan
Greenhorn


Joined: 02 Jan 2006
Posts: 9

I think this 5 cows processor has been mentioned before, but I'm not sure weather 'longhorn' has been tried as the key Confused .

PostPosted: Mon Feb 13, 2006 12:14 pm
 View user's profile MSN Messenger
 Back to top 
Ashin
Veteran


Joined: 22 Nov 2005
Posts: 140

First off: Trout to the last 3 of you!

I have a feeling when we do find out what the keyphrase is, we're all going to slapping our foreheads. This is, however, assuming that the 13th Labour part is actually some sort of keyphrase hint.

It's been mentioned before, but there are 12 RSA challenges http://www.rsasecurity.com/rsalabs/node.asp?id=2103, and this would be the 13th one. All of which revolve around RC5. Most likely the card title and the 64/12/8 are both hints to point us to RC5-64 and nothing else.

Right now this card is only going to be solved by time (like the rest of the RSA challenges), so keep your computers running people. When you go to sleep at night, kick off the programs from previous pages and let it run. If everyone chips in we might have a solution in 5 or 10 years Smile

PostPosted: Mon Feb 13, 2006 2:41 pm
Last edited by Ashin on Wed Feb 07, 2007 2:57 pm; edited 1 time in total
 View user's profile
 Back to top 
hamatoyoshi
Veteran

Joined: 02 Aug 2004
Posts: 127

I haven't been tracking the progress of Perplex City for about a year and decided to drop in. This thread kind of caught my interest.

I've read and searched, and I'm by no means qualified to discuss the topic of encryption, but here's an idea I don't think was thrown out after I read the thread and the Wikipedia entry on RC5 for a little background.

I couldn't help but notice this in the article:
Quote:
12-round RC5 (with 64-bit blocks) is susceptible to a differential attack using 2^44 chosen plaintexts


Checking around, I found a little more background on this with an RSA Laboratories Technical Report (grc.com - no clue who they are, also PDF warning) describing the vulnerability, and the actual publication discussing this attack itself (PostScript format warning) from the Author's list of publications (weizmann.ac.il).

I participated in distributed.net's RC5-64 project back in the day with only a vague idea of what it was doing (I liked the idea of not wasting idle CPU cycles.), but from a distrbuted.net FAQ entry, I see the task required (at most) brute forcing 2^64 keys.

So my question is, is it easier to mount an attack using 2^44 known plaintexts or 2^64 keys? And if 2^44 known plaintexts is easier, could we do it, and if so, how fast?

Also, I saw some mention about whether this code block used electronic code book (ECB) or cipher block chaining (CBC). I get the impression that ECB is relatively trivial to crack in certain cases, particularly given we have more than one block, so I assume it must be CBC. Unfortunately, I can't find any online literature on how to go about an ECB attack.

PostPosted: Mon Feb 13, 2006 11:15 pm
 View user's profile
 Back to top 
Jakeo
Decorated

Joined: 30 Aug 2005
Posts: 159
Location: Edinburgh

[quote="hamatoyoshi"]
So my question is, is it easier to mount an attack using 2^44 known plaintexts or 2^64 keys? And if 2^44 known plaintexts is easier, could we do it, and if so, how fast?
[quote]

The attack is based on the assumption that if you have 2^44 plaintexts and you can see how they output, then you can work out the key that was used to seed the output stream.

So in short, it isn't possible to mount a chosen plaintext attack on this cipher. Sorry.

PostPosted: Tue Feb 14, 2006 12:55 am
 View user's profile
 Back to top 
fretty
Decorated

Joined: 19 Nov 2004
Posts: 281
Location: South Yorkshire, England

Sorry if mensioned before but there appears to be a little black dot at the end of the third line up from the bottom. It appears on both the card catalogue and the perplex city site picture, don't know if it's a coincidence or not. Could this contain any info?
Also has longhorn been tried as a keyword?

PostPosted: Tue Feb 14, 2006 2:13 pm
 View user's profile
 Back to top 
groovygirl20
Veteran


Joined: 04 Jan 2006
Posts: 100
Location: Lincolnshire! ENGLAND!! WOO!!

again i am stepping in (groovygirl20)

the little black dot and or lines on the cards are like printing errors and not necessarily on all the cards there! i dont have my cards with me now as i am at school ... but shal have a look later when i am home Smile
_________________
To the query, ''What is a friend?'' his reply was ''A single soul dwelling in two bodies.''

PostPosted: Tue Feb 14, 2006 3:34 pm
 View user's profile Visit poster's website
 Back to top 
hamatoyoshi
Veteran

Joined: 02 Aug 2004
Posts: 127

Jakeo wrote:
The attack is based on the assumption that if you have 2^44 plaintexts and you can see how they output, then you can work out the key that was used to seed the output stream.

So in short, it isn't possible to mount a chosen plaintext attack on this cipher. Sorry.


Ahh... I read up on chosen plaintext attacks at the Wikipedia and see that we would need to be able to encrypt all this information with the same key as used on the card.

I looked at the possible variations and it would take terabytes of storage to keep all those plaintexts anyway. Ouch.

PostPosted: Wed Feb 15, 2006 5:33 pm
 View user's profile
 Back to top 
fretty
Decorated

Joined: 19 Nov 2004
Posts: 281
Location: South Yorkshire, England

Has anyone recieved a Von's clue for this?

PostPosted: Thu Feb 16, 2006 11:52 am
 View user's profile
 Back to top 
CherokeeParkes
Decorated


Joined: 03 Nov 2005
Posts: 236
Location: Belfast, Northern Ireland

Back near the start of this thread there was a post from Oliver.
His post his on page 7.

The clue is rccrypt.

As perviously mentioned in other posts rccrypt is a rc-5 decrypting program. It also appears to only be for linux or windows with a c compiler. Of course all this has been googled, discussed and disected at length.

PostPosted: Thu Feb 16, 2006 12:05 pm
 View user's profile
 Back to top 
hairysocks
Boot


Joined: 09 Jan 2006
Posts: 38
Location: Exeter, Devon, England

Do we know yet if the decrypted data is readable text? It could be an image file, such as a BMP. Given the size of the data its unlikely, but it may be one of those square barcodes, such as the one on the Barcode Recipe card, which may take you to a site with a question.

Another thing - I've noticed people suggesting four letter words and trying them in upper and lower case, but that may not be enough because of all the combinations of case a 8-letter word can have 256 possible variations. If you start including the possibility of number substituting letters the number of combinations rises even higher.

For example, if you allow 5 instead of S and 2 instead of Z and 1 instead of I then an 8-letter word with S Z and I will have 2x2x2x2x2x3x3x3 = 864 possible variations.

I have written some Java code that generates all combinations of letters and number-substitutions for 8-letter words, the number-substitutions I allow are:

'A' = '4'
'B' = '8'
'D' = '0'
'E' = '3'
'G' = '9'
'G' = '6'
'I' = '1'
'L' = '1'
'O' = '0'
'P' = '9'
'S' = '5'
'T' = '7'
'Z' = '2'

Please let me know if there are any other obvious ones I've missed out.

I also have a Java application that searches a file and reports on any sequence of 10 characters that are "printable" (i.e. may be the decrypted message. I'm thinking of modifying it to look for image files for the reason explained above.

These Java apps are wrapped up with some shell-scripting and run on my Linux boxes.

Is there anyone who would be interested in having this Java code and shell script?
_________________
"You never can tell with Heffalumps"

PostPosted: Sun Feb 19, 2006 10:26 pm
 View user's profile
 Back to top 
Jakeo
Decorated

Joined: 30 Aug 2005
Posts: 159
Location: Edinburgh

hairysocks wrote:
Do we know yet if the decrypted data is readable text? It could be an image file, such as a BMP. Given the size of the data its unlikely, but it may be one of those square barcodes, such as the one on the Barcode Recipe card, which may take you to a site with a question.


I believe the hidden message with start with
Code:
The unknown message is:
As this is how the other messages on distributed.net start.

I have no real justification for this to be true for this card, other than it was true for the other distributed.net puzzles, but to my mind it fits with the MC's Modus Operandi

I believe that with this card MC are hoping to demonstrate the power of the ARG. To crack this puzzle likely involves a large, systematic use of thousands of machines, and something like an ARG, where co-operation is key and everyone wants to reach a common goal makes it an ideal platform.

We've already written a book, which to anyone not involved seems like an incredible thing, but to solve this would be a serious demonstration of co-ordination. MC have already been using the book as an example of the sort of thing that we can do, and it would pale into insignificance compared to solving this.

PostPosted: Mon Feb 20, 2006 1:05 am
 View user's profile
 Back to top 
c1023
Boot

Joined: 21 Oct 2005
Posts: 58
Location: Hampshire, UK

In my build of rccrypt (bottom of page 12) I made it test combinations of the following:
Written forwards and backwards - "password" and "drowssap"
Padded to the left and the right - " passwd" and "passwd "
Padded with spaces and nulls - " passwd" and "\0\0passwd"
As well as all combinations of upper and lower case

You may want to add them as well.

PostPosted: Mon Feb 20, 2006 2:49 pm
 View user's profile
 Back to top 
Rob_Riv
Unfettered

Joined: 17 Feb 2005
Posts: 350

Reason wrote:
When Fi saw me get this one out the pack she told me it should be solved 'sooner rather than later'.


D'ya think we've missed out on the 'deadline'?
_________________
"I suggest something involving a corkscrew, a 9 volt battery, and a colony of fire ants. I'm not sure what one could do with those things, but whatever it is it'll be excruciatingly painful." - Ankit Jain (Spankit) on Ryandrew's punishment.

PostPosted: Tue Feb 21, 2006 10:17 pm
 View user's profile MSN Messenger
 Back to top 
CherokeeParkes
Decorated


Joined: 03 Nov 2005
Posts: 236
Location: Belfast, Northern Ireland

If is is a date then it is waaaaayyyyyy past.

64 defintley would be the year as for 12 and 8 highly interchangable. Also the style of the date yy/mm/dd

My question if it is a date which country uses it and is it a clue?

PostPosted: Wed Feb 22, 2006 1:25 am
 View user's profile
 Back to top 
unrealt87
Boot


Joined: 29 Nov 2005
Posts: 66
Location: Guildford!

Ok guys, it's time for a quick outta-the-box think.

Can everyone who has this card verify that it has NO pixel markings along it's silver edge?

And if so, what if the cows are a bluff?
Wouldn't it be ever so convenient for the passcode to be a variant of :

nopixels?

Come on Ashin, get ready to slap your forehead, cos this HAS to be right Very Happy

P.s. I Dare you to trout this Smile

PostPosted: Wed Feb 22, 2006 1:40 am
 View user's profile Visit poster's website Yahoo Messenger MSN Messenger
 Back to top 
Display posts from previous:   Sort by:   
Page 23 of 35 [518 Posts]   Goto page: Previous 1, 2, 3, ..., 21, 22, 23, 24, 25, ..., 33, 34, 35  Next
View previous topicView next topic
 Forum index » Diversions » Perplex City Puzzle Cards » PXC: Silver Puzzle Cards
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum
You cannot post calendar events in this forum



Powered by phpBB © 2001, 2005 phpBB Group