PyPE solution to PE problem 59
PyPE solution to PE problem 59
Blueprint information
- Status:
- Complete
- Approver:
- None
- Priority:
- Undefined
- Drafter:
- None
- Direction:
- Needs approval
- Assignee:
- None
- Definition:
- Approved
- Series goal:
- None
- Implementation:
-
Implemented
- Milestone target:
- None
- Started by
- Scott Armitage
- Completed by
- Scott Armitage
Related branches
Related bugs
Sprints
Whiteboard
ProjectEule
===
Each character on a computer is assigned a unique code and the preferred
standard is ASCII (American Standard Code for Information Interchange). For
example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107.
A modern encryption method is to take a text file, convert the bytes to
ASCII, then XOR each byte with a given value, taken from a secret key. The
advantage with the XOR function is that using the same encryption key on
the cipher text, restores the plain text; for example, 65 XOR 42 = 107,
then 107 XOR 42 = 65.
For unbreakable encryption, the key is the same length as the plain text
message, and the key is made up of random bytes. The user would keep the
encrypted message and the encryption key in different locations, and
without both "halves", it is impossible to decrypt the message.
Unfortunately, this method is impractical for most users, so the modified
method is to use a password as a key. If the password is shorter than the
message, which is likely, the key is repeated cyclically throughout the
message. The balance for this method is using a sufficiently long password
key for security, but short enough to be memorable.
Your task has been made easy, as the encryption key consists of three lower
case characters. Using cipher1.txt (right click and 'Save Link/Target
As...'), a file containing the encrypted ASCII codes, and the knowledge
that the plain text must contain common English words, decrypt the message
and find the sum of the ASCII values in the original text.
Solution
--------
We perform a brute-force attack on the cypher-text. ASCII tables tell us
that lower-case letters (the only possibilities for the passkey) have
values 97 through 122, so we vary the three bytes of our passkey in this
range. This limits us to about 17,000 possible passkeys to check.
Next, we decode the entire message using binary xor operations on the data
and the passkey. Again, ASCII tables tell us that all of the /printable/
characters range from 32 to 126, so we ignore any decoded messages with
values outside of this range.
Lastly, we check for common words -- 'the' and 'was', specifically, seem
to result in the proper solution. Note that this may not nececssarily work
for some other cypher-text.
Answer
------
107359