Isn't this referred to as 'Polyalphabetic Ciphering'? I'm only recently learning about it myself. I've discovered all kinds of potential ciphers and patterns to follow. I've created a Steam Group covering the games I play and I've been working on creating guides that provide screenshots for others to view.
http://steamcommunity.com/groups/y27
It all started for me by seeing the number 27 in so many damned games anymore. In fact, you'll see it and hear it in so many TV shows, movies, games, magazines, advertisements, that it's not funny.
To me, there are all kinds of things hidden in these games. Patterns, numbers, polyalphabetic ciphering references, etc. Anyways, if you browse a few of my forum posts, you'll see what I'm talking about. I've even made a few Steam Guides with pictures just to prove it to people.
BioSHock Infinite and Deus Ex: Human Revolution - The Missing Link both make references to Ciphering. In BSInf, once you see Elizabeth's area, the first room has a chalkboard filled with a Polyalphabetic Cipher and a message incomplete. There's a book entitled "Ciphers for the Little Folks" by Dorothy Kane (which turns out is an actual book that teaches you how to learn ciphering. However, the author's real name is Dorothy Crain. It was published in 1916 in Geneva, Illinois).
https://archive.org/details/ciphersforlittle01crai
The truly bizarre thing about this book is this: I couldn't find any other online search results for either Dorothy Crain, nor her affiliation with Riverbank Laboratories, nor her accreditation of being a Kindergarten teacher, nor her Ciphering Series for Kindergartners, nor her connection to ciphering at all. This is the only link I could muster. And it was practically handed to us on a silver plate by 2K Games (though, I admit, my google skills suck).
Maybe that'll help ya crack the code once and for all.
Wouldn't the embalming process have damaged the DNA? Also, were all of the ciggarettes involved in the case lost, or can they be tested? If the partially smoked cigarrette had been poisoned, could that part not have been tested? And even if that were the case, wouldn't the respiratory damage have gone beyond the pharanx and caued issue with his lungs? The idea that the Rubaiyat of Omar Kahyyam is the text the code is based on is very likely, owning to the unlikelyhood of such a rare copy being invovled, and so many copies being involved when the text was so old even at the time. Google gives a link to a first edition copy for sale. Though the price is expensive, maybe the buyer might be willing to cooperate. If not there are always net versions such as this. As for the what is to usually thought of as a M or W on the first and third lines of the code, it seems more like a symbol than a letter. Maybe that part indicates those two lines tell the page numbers/ text lines to use for the bottom two lines? The fact that the second and fourth lines begin the same but then alter, maybe the third and fifth line were decided upon after the writer decided upon the first and third? Hopefully didn't loose you there. Just musing. Best of luck!
From Pexels: https://www.pexels.com/photo/view-of-sunset-2248523/, photo has nothing to do with the code (it is just a tool). It seems to be taken in Norfolk, Virginia [don't know the abbreviation -_-].
Suggest to the guy to read "The Codebreakers" by David Kahn (that's Kahn, not Khan).
Strongly recommended for anyone interested in ciphers and cryptology. If it's over his head, start with any kid's level book on ciphers and work your way up.
Definitely a reflector, because it sits at the end of the rotor system. This is an image of what it looks like.
The hex code does indeed look like a combo of GATC characters, and they seem to be linked in the same way as DNA (T-A; G-C) which should make describing it fairly easy. When I get some time, I'll combine together an image and transcribe it.
The gallery is linked on the front page, but here is a direct link for you: https://www.dropbox.com/sh/bcrm8reylf78j31/p5wdq9OLqh
I will go through and mark each of the ciphers as either "Untranscribed", "Unsolved", or "Solved" to make it easier.
Won't be able to crack it without a key. You need to search for a key, not try to crack this on its own:
“Unfortunately the message has been encrypted using a pre-arranged cipher key, without which its contents are unreadable. It is unclear why this wasn’t transmitted via the NMLA’s dark-comms network, which remains undetectable despite our best efforts.”
https://www.elitedangerous.com/news/galnet/manhunt-theta-seven-escalates
I assume the key is revealed somewhere in-game or related sites.
Oh, it looks like this is a post from a ROBLOX forum:
https://www.roblox.com/Groups/Group.aspx?gid=2889953
REHPIC Searching for intellectual individuals. You'll find that there's more than one way into this group.
01101000 01110100 01110100 01110000 01110011 00111010 00101111 00101111 01110100 01110111 01101001 01110100 01110100 01100101 01110010 00101110 01100011 01101111 01101101 00101111 01001111 01011010 01000101 01101011 01010110 01000111 00111001 01000101 01101010 01101110 01010100 01101110 01001011 01001010 00110111
binary -> ascii is:
Her surname is correctly spelled "Anderson". The US census 1900 provides Information about her family (her father was a plasterer): https://www.familysearch.org/ark:/61903/3:1:S3HT-6L93-VPG?i=7&cc=1325221
Get the community enhanced windows binaries. There isn't really an install procedure as such, it is just a binary. You run it on the command line.
Usage examples http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats
You will need to find some good word lists too.
But it does work, since the algorithm is equivalent to the one mangarock uses. E.g. if you base64 the output file the result will be equivalent to what you see in devtools network explorer (data:image/webp;base64,...). Maybe there's a problem with your webp image viewer? Here's an example file: https://files.fm/u/cgrxa6qb. Try opening it in Google Chrome or you could use any online webp to png converter. There are also python plugins that can do that.
Cryptool has an archive of older builds, some as old as 2011, if you'd like to find that version that handled Enigma better.
To make it simpler I've adapter the interactive version into a non-interactive version so you can just have all the syntax in one line so you can batch process if you need to : https://pastebin.com/smjWjCUr usage:
Encrypt:
./vigenere-ni.sh -e STRING KEY
Decrypt:
./vigenere-ni.sh -d STRING KEY
for example
>./vigenere-ni.sh -e HELLO WORLD
DSCWR
>./vigenere-ni.sh -d DSCWR WORLD
HELLO
Remember to use all caps, I didn't sanitize it.
The files are in an android backup format and can be decrypted if you have the correct password. I tried using this tool (and a custom one) but the passwords you provided don't work.
Are you sure one of the codes you posted is the password used to encrypt the backup? They seem like lock-screen codes. Without the correct password the files will be impossible to recover as they are encrypted using strong cryptography^1.
If you think of any other password(s) that you might have used you can try using the tool I mentioned before and see if you are able to decrypt any of the files. Or, if you prefer, feel free to PM me (or post here if you don't mind sharing them publicly) and I'll try them on the files you provided (the tool was easy to use on Linux but it might be a pain to install/use on Windows/Mac, IDK).
Also, you mentioned that you extracted the files you wanted from somewhere. Where did you extract them from and how? It's possible that the actual key used for decryption is contained in another file, but that's just a guess.
^1 For those interested: The password is run though PBKDF2 and used as a key to encrypt a random master key (also ran through PBKDF2) which is then used to encrypt the file with 256-bit AES in CBC mode.
With a powerful enough computer, and enough time, there is a reasonably high change I could guess your password (depending upon it's complexity). One thing that computers are pretty bad at, even very powerful computers, is finding factors of large numbers. That is the secret behind how public/private keys work. If you really interested in the topic, take a look at Digital Oceans ssh-keys tutorial and read into the RSA encryption method to see how it's basically IRL magic.
This is the software that the device is designed to run it.
https://www.blackmagicdesign.com/products/davinciresolve/edit
The DaVinci Resolve 17 (non-studio) should function without a trial, and the panel works on that version.
I can't find a download of the firmware anyway, and I am not able to download it from the device using dfu-util [though, admittedly, I am not familiar with that tool).
I _might_ be able to upload my own firmware with this tool though, which would ultimately solve my problem (or more likely, brick the device).
Ha ha! I wasted some time looking at the wrong one then: http://txti.es/43723
43723 is 23 * 1901 (not only odd numbers, but primes too).
The code there is base64 that decodes to what looks like a capture of a couple of TLS encrypted data packets.
Thanks.
I'm not convinced there's a signal there.
Try this in audacity for example: New file, generate noise (white). Then apply a ridiculously steep band pass filter around 1300Hz removing basically everything around that frequency. The result already sound very similar. For the stereo effect, you can then duplicate the track, pan one hard left and the other hard right, and maybe offset one a little bit. Sounds extremely close IMO for a quick approximation. (ignoring the water sound and the "eery ambiance synth that comes in and out at various moments")
I don't hear the stream of quick bursts of noises expected in RTTY. (see this link for an audio example (autoplay) of what I'm trying to describe (amazing website btw))
If there's a signal, it's of pretty low quality I'm not sure you'd be able to extract anything meaningful.
Are there any clue, or past element that would lead to thinking that this kind of signal hidden in audio files are plausible?
Because otherwise, Pareidolia can explain why you might hear something in noise.
I look up the coords. (taking out the extra " 32" ") and yes, it is in belgium
Kapelstraat 40, 8880 Sint-Eloois-Winkel, BE is the address
https://www.bing.com/maps?q=52%c2%b0+19.123+E+004%c2%b0+50.123&FORM=HDRSC4&adlt=strict
This one works fairly well: http://futureboy.us/stegano/
Otherwise, you can also use paint.net
with steganography filter. Sometime unstable, and not always working well, but it can do some that the first link can't.
And there's probably much more
Remove the commas and paste into a binary to text converter, like this one:
https://www.browserling.com/tools/binary-to-text
And you get:
11000011 0000001 10001000 01010101 10001100 00110000 00100100
Then by looking at 0000001, you probably need to read from bottom to top, e.g turning that 00000001 into 10000000.
I need a bigger sample size to progress further. Use pastebin or something to post a bigger sample.
Oh perfect. I think the easiest is that command line option, but you can download the tarball from this site https://www.gnupg.org/download/index.html
And the direct download link is: https://www.gnupg.org/ftp/gcrypt/gnupg/gnupg-2.0.29.tar.bz2
I don't speak Spanish. I've tried deciphering it as a monoalphabetic substitution with CrypTool.
Does this make sense?
NÓQUESDEMADEMONESSACIALATIVERÁLOSPRIMER
I believe it's made by educators with the goal of teaching crypto, so yes! https://www.cryptool.org/en/
I have used an old version and assumed the new version was the same, but maybe things changed and I should read the instructions...
I've used other great online enigma crackers over the years, but all of my bookmarks are dead now. I don't get it.
Another amazing tool is Cryptocrack. It doesn't do Enigma, but lots of classical ciphers.
> What are the max lengths for a username and password?
The only limitation is the MSSQL Server. This combination of user and password are the credentials that the software use to access it's DB.
Should I create with random chars? any desired length? I've tried with Cryptool but couldn't find anything.
EDIT: Seems that it concatenates the user + password and use part of the user to encode the password maybe?
If you had asked 2 years ago I could give you links to a bunch of great online Enigma crackers, but for whatever reason every one of them has been deleted. WTF? I wonder if the wayback machine saves java applets.
However, Cryptool2 is pretty good. It used to be way better, allowing you to use cribs if you have any, but it could still work.
It's not public yet since I'm not completely happy with it but here's the code to bruteforce MD5 you can modify it to suit almost anything, I'll probably make a post on here once it's done though https://ghostbin.com/paste/3fmmh
Answer
Hey, thanks for playing. Every time you solve a puzzle, I will reward you with something I like. The first reward I will share one of my favorite games of all time, called Overwatch. https://playoverwatch.com/en-us/РР
FOR THE NEXT REWARD I WILL GIVE YOU ONE OF MY FAVORITE WEBSITES. HTTPS://SCRATCH.MIT.EDU/ T MAY SEEM CHILDISH WHEN YOU FIRST START, BUT IT CAN ACTUALLY BE REALLY CHALLENGING. WHY DON'T YOU CHECK OUT MY YT CHANNEL?
I tried one time pad. But it didn't give anything either. Apparently op used an app. Alles decrypto and a link came out. You can scroll down to seenbis reply to my comments.
https://cryptpad.fr/pad/#/2/pad/view /YReoWf9qfTxTrGWyAuf6lw3MKKwPXOrzxREiiX5onGM/embed/
They have eyehole security cameras you can put on your apartment door from the inside looking out. You should invest in one just in case this takes a negative turn. https://www.amazon.com/Doorbell-Electronic-Peephole-Batteries-Included/dp/B07W7ZQ4QS
I made an app for this. It's a rune learning app and includes the elder, younger, and medieval Futhark :
https://play.google.com/store/apps/details?id=com.gbcapps.runic.futhark
This is runic alphabet (Futhark)
In case you're interested, I made an app to learn it :
https://play.google.com/store/apps/details?id=com.gbcapps.runic.futhark
> 9780142437247
>!is a reference to Moby Dick by H. Mellville, specifically the edition published by Penguin Classics in 2003 (see https://www.amazon.com/Graphic-Classics-Herman-Quirk-Melville/dp/B00726OT20)!<
Helen Fouche Gaines Cryptanalysis I think is probably one of the best out there. I did notice it get a nod in Khan's Codebreakers. It was written before enigma, so misses a bit on ADGFXs and Quagmires and such, but it's comprehensive up to its publication date.
For what I can tell, it should be GD. They made an error. Not terribly uncommon. I made one in a geocache challenge and I was left wondering why nobody could find it. There is an excellent book on cryptography called "Codebreakers" that had a really fun cipher challenge but he goofed on the PKE and made it basically impossible to solve.
Two good books:
1) Cryptanalysis: a study of ciphers and their solution by Helen Fouché Gaines
2) Codes, Ciphers and Secret Writing by Martin Gardner