• Keine Ergebnisse gefunden

Crypto Contest / Preisaufgabe

N/A
N/A
Protected

Academic year: 2022

Aktie "Crypto Contest / Preisaufgabe"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

MATHEMATISCHES INSTITUT DER UNIVERSIT ¨AT M ¨UNCHEN

Prof. Otto Forster

WS 2002/2003 November 28, 2002

Crypto Contest / Preisaufgabe

for the students of the course Cryptography, WS 2002/03

The problem is to decrypt the following cipher text

AWRCV QKDWW BBSIF IDSBL GAYVU XBQOD CWLQE GDBPO RUHMH SYEQP HFQCW KCRPC MUIHX FEHES NQKLO RRLKX GAGUP OQSVK ZNWLM WJKHG GUWRM BQWTI XWNKK MNMET CTDTP RYFZF IDYKG TQYFB FPRBT JPBGK OWTYC SZCLA CVMWX ARBSO DAGSR ZPTBK YSNPP LLGKR PXRJZ MKFHY GAKIJ GAYGK ATOMW ZIZVJ RTKCX NEFQH OGXAC WRHEL SVBFJ BXQAJ SSBUJ AOJRZ XQLJY NIHUY AUVOU PAQIN DEVPI VZIEN TONZY GRSLU KYYWU ZTVNU OUCTJ KWGMK TIUMK BOTDQ DAESD OMCLX IJHHT KWUDS SPVAA FGAFD VTKUT AHSTD BFBQC MVERX FCTAM NYVKM LNHPB JULWL OQZXN RDUWU LFKRT PLGJT EAFEW PKMMQ ODSOZ JZOBY KCANV AMXUQ JFMSR WTPJB JJXYN XYHGZ BQGEI GZZES QEKKJ IBJBY SZPAL WQRLS TUYRA MQQDH SYHPG HOOSV KXXZT MECKH TCATR ECZFJ JJJCV GBIWT CASYO SPMUR OQLFZ BLXAX WDSQK MFXVI BAGAC JBAAU IMVQX LHCKQ MHUNA FEXWI YFJPG BDKCI ABLNA GJNSW IFYNU JJWBU YYTAQ IPPLR NQZPY DNLFG HVAKJ HIIYX ENVYL KKOCK APFXZ NFZZJ EHFIK WSIXF XDLRF SVIMB RYUKJ NIFLQ AOSCW TXWNV FUKQX LOTCP UWRAB UPAHZ OWQXQ YPVLR GEGGF DKIUU XXUWN IQAWQ JEDKP BKLMR VEXTI QXCPZ LURVR JANSA TVWRS IFYNN JSBLK AJQBJ LZLBX RSKDG ONJZW AKKHN LLIBI BYQQA KIYHZ UOPRX VZGBP TXYDE LLNKV WULSK AESRD YZHAQ NWPUE QSVRY DAKXP VQWWK AJUMY GIRNP XKXNI EJHGM WZBLO BTUEG PCJMJ WSKIU NQGZJ PQTTA SQTST UMSCY FTFWT IJSNL YXCUW IMQLZ IGHJA VRXGC UOVXF WDUNL YQSNK GQMZI FNAQR ZYCOK PFUWF SETGR IHYAO NZQRO ETRUX BXTHQ LENQT JYZBQ LLGJA USFRQ HIJAA WRRGU PSOBC QVTPB CHHJB FEGVJ HCOPA ADDOP WUFZE ITYED CGEZY UGJXZ BLQXU ODKLJ YJHQZ THUZK

which resulted from an English plaintext, written in the alphabet {A,B, . . . ,Z} ∼= Z26 without spaces and punctuation marks. The text was encrypted using a composition of three different cipher systems

C =R◦P ◦T.

(1)T is a transposition cipher depending on a secret permutationσof{1,2,3,4,5}and works as follows: The text is divided into blocks of 25 letters. These letters are written as the five rows (xi1xi2. . . xi5),i= 1,2, . . . ,5, of a 5×5-matrix. The transformed block is the sequence of columns (x1σ(j)x2σ(j). . . x5σ(j)),j = 1,2, . . . ,5, in the permuted order.

(If the last block is shorter than 25 letters, only the upper part of the matrix is filled, and the columns become shorter.)

(2) P is a monoalphabetic substitution using a secret permutationπ :Z26 →Z26. p.t.o.

(2)

(3) The third transformation R is done by a rotor machine consisting of three rotors with hardwired permutations π1, π2, π3 : Z26 Z26, which are taken from the set a, πb, πc}in an unknown order, with

πa: EKMFLGDQVZNTOWYHXUSPAIBRCJ πb: AJDKSIRUXBLHWTMCQGZNPYFVOE πc: BDFHJLCPRTXVZNYEIWGAKMUSQO

This notation means πa(A) = E, πa(B) = K, πa(C) = M, etc. (The same permutations were also used in the Enigma.) The rotors had secret initial positions (s1, s2, s3)∈Z326. The i-th letter of the input text to R (starting with i = 0) is transformed by the permutation

k3(i)π3ρk3(i))k2(i)π2ρk2(i))k1(i)π1ρk1(i)) :Z26→Z26, where ρ:Z26→Z26 is the shift ρ(x) :=x+ 1 (mod 26) and the integers

k1(i), k2(i), k3(i)∈ {0,1,2, . . . ,25} are defined by the relation

s1+s2·26 +s3·262+i=k1(i) +k2(i)·26 +k3(i)·262 (mod 263).

Solutions, together with a short explanation of the method used, should be sent by Email as soon as possible, but not later than Feb. 4, 2003, 9:00 a.m. to

forster@mathematik.uni-muenchen.de

Winner is who first returns the correct solution. The winner (or the winning team) receives 32 extra marks and a modest prize.

To save you typing, a data file containing the cipher text and the permutationsπa, πb, πc

can be downloaded from the homepage of the course

http://www.mathematik.uni-muenchen.de/~forster/vorlA2w_cry.html You might also be interested to have a look at the previous crypto contests 3 and 6 years ago.

Wishing you a successful decoding

Otto Forster

Referenzen

ÄHNLICHE DOKUMENTE

This evaluation case study analyzes developments related to crypto assets and the underlying crypto technology in the case of Switzerland.. The canton of Zug was the first

78 Maultzsch, ‘Contractual Liability of Online Platform Operators: European Proposals and established Principles’ [2018] European Review of Contract Law, 209 (211); Možina,

These EU-law based issues are discussed in the first half of this book, including inter alia EU private international law, consumer protection law, financial services and

GOCH. Zu einer Krimilesung lädt die VHS Goch am Don- nerstag, 20. Klaus Hell liest aus seinem Roman vom Niederrhein, „Die Sache mit Mia“, – mit einem spannenden Finale auf der

Issum, aber auch für die bereits bestehenden Beratungsstan- dorte in Geldern, Kevelaer und Straelen sucht die Caritas nun wieder neue ehrenamtliche Mit- arbeiter, die sich gerne

Voice Contest · c/o Musikschule der Stadt Bottrop · Blumenstraße 12 -14 · 46236 Bottrop E-Mail: voice-contest@bottrop.de. *

Angola Oracle User Group, Oracle User Group Armenia, Austrian Oracle User Group, Azerbaijan Oracle User Group, Bulgarian Association of Software Developer, Bulgarian Oracle User

Anlässlich des 20-Jahr Jubiläums des Einkaufszentrums Novaseta führt die Thurgauer Kantonalbank Arbon (TKB) zusammen mit der Kinder- und Jugendarbeit Arbon den