Originally posted by greenpawn34
Give it to the guy or woman who cracked the code.
Can you think of another way to send moves via text.
How abiout designate each file a country.
A1/A8 - America
B1/ B8 - Belgium
C1/C8 - Canada
D1/D8- Denmanrk
E1/E8- England
F1/F8 - France
G1/G8 - Germany
H1/H8 - Holland
Then the days of the week Sunday=1 Monday = 2etc.
(no day mentioned is 8)
I will be in Germany next week, then on Friday I will be in France.
g8-f6.
Encrypting the perfect square.
First, an important point here is that we know the total message length is 64. So any kind of
block cypher can be used and salted - although this is not the route that we will be taking
here…for simplicities sake.
64 bits?
26 characters in the english alphabet.
52 characters when including capitals and lower case characters.
now the question becomes- How do we add 12 more characters? Obviously there is a slough
of answers here, I personally enjoy symbols. Very often "salting" is done using symbols…this
creates an illusion which quite often would send a code breaker in the wrong direction.
!@#$%^&*(),. A total of twelve symbols here - one for each numeral character on
the qwertic keyboard and the two most common punctuations.
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*(),.
and now we have an alphabet which can describe each square. On to the fun stuff.
At this point, we could convert algebraic notation to our above board notation.
However that would be very easy to break now wouldn't it? (64 character straight alphabet?
come on now… we can do so much better!)
With a '64 bit system we can easily encrypt it.
We know we can't use 8 (8^2=64) … how about 7 and 9? this makes an easy
secondary shift. How about -7 and 9? This makes it much more difficult for software to
break. It will still create 63, a single matrix shift (you'll understand soon).
Matrix 1 - - - - - - - - - - - - - - - - Matrix 2
abcdefgh - - - - - - - - - - - - - - - - a1 a2 a3 a4 a5 a6 a7 a8
ijklmnop - - - - - - - - - - - - - - - - -b1 b2 b3 b4 b5 b6 b7 b8
qrstuvwx - - - - - - - - - - - - - - - - -c1 c2 c3 c4 c5 c6 c7 c8
yzABCDEF- - - - - - - - - - - - - - - -d1 d2 d3 d4 d5 d6 d7 d8
GHIJKLMN- - - - - - - - - - - - - - - - e1 e2 e3 e4 e5 e6 e7 e8
OPQRSTUV- - - - - - - - - - - - - - - -f1 f2 f3 f4 f5 f6 f7 f8
WXYZ!@#$- - - - - - - - - - - - - - - - g1 g2 g3 g4 g5 g6 g7 g8
%^&*(),. - - - - - - - - - - - - - - - - - - -h1 h2 h3 h4 h5 h6 h7 h8
Now we have our matrices, and we have our cipher…now its just work!
Notice - count from "a" 7 bits… you come to "g" now count 7 more you come to "n"
Encrypted Matrix 1- - - - - - - - - - - - - - - - Matrix 2
gnuAGNU@( - - - - - - - - --- - - - a1 a2 a3 a4 a5 a6 a7 a8
dkryFMT! - -- - - - - - - - - - - - - - - b1 b2 b3 b4 b5 b6 b7 b8
*cjqxELS- - - - - - - - - - - - - - - - --c1 c2 c3 c4 c5 c6 c7 c8
Z&bipwDK- - - - - - - - - - - - - - - - d1 d2 d3 d4 d5 d6 d7 d8
RY^ahovC- - - - - - - - - - - - - - - - e1 e2 e3 e4 e5 e6 e7 e8
JQX%.gnu- - - - - - - - - - - - - - - - f1 f2 f3 f4 f5 f6 f7 f8
BIPW$,fm - - - - - - - - - - - - - - - - g1 g2 g3 g4 g5 g6 g7 g8
tAHOV# ) e- - - - - - - - - - - - - - - - h1 h2 h3 h4 h5 h6 h7 h8
Whew!!! ok, now we have an encrypted matrix - our cypher! Now a really sharp system would
allow for different encryption shifts. How? Well, by allowing our first numbers into our
messages.
I know…your saying "Hey Wait!!!" "You said no salting!" … well.. the fun part is that our "salt"
isn't salt - its useful. It describes the cypher system.
79
Ya
vh
Jq
!g
ZX
TM
Xn and thats mate...
The encryption is described as 79 (point shift) and each message is from square to square.
-GIN