lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 3 Nov 2013 22:33:42 +0000
From: Daniel Llewellyn <diddledan@...il.com>
To: Daniël W. Crompton <daniel.crompton@...il.com>
Cc: cpunks <cypherpunks@...nks.org>,
 Full Disclosure <full-disclosure@...ts.grok.org.uk>,
 Cypherpunks list <cypherpunks@...qaeda.net>,
 Discussion of cryptography and related <cryptography@...dombit.net>
Subject: Re: [cryptography] coderman's keys

the quote is from a savant called "Daniel Tammet":
http://en.wikipedia.org/wiki/Daniel_Tammet

the clue is to count primes, not just count. I got as far as spotting that
the ciphertext has the words "clue" and "tip" where clude is at character
locations 11, 12, 13 and 14 - 11 is a prime. I gave up after reconstructing
what looked like a base64 encoded string by counting all the primes from
teh first 1000 prime number set starting from the prime "3" because the
number 3 is located very close to the word tip and happens to be a
prime-numbered distance from the word "clue". I also reconstructed a
hexadecimal value "AAD50AD65B52324ECB602D12FA2477F" by stripping all
non-hex characters from the base64 string that I reconstructed
"sdkR/VHfGppgptLSRJsyyRSoxxOIxUoabuGpqTJQr+xayphMtkZYkq+rWcJOoazSgRywtj=XridRKPbppycgyxOvIjwIiSGkwwgSGeUUOKOcZqsKJMwN".

I don't know if any of that is the correct way of approaching the problem
because I'm not a security expert. (I monitor this list for early warnings
of potential issues with softwares that I run rather than because I'm
clever.) If I'm on the right track maybe someone else can get further and
win the ~$200, but it isn't going to come my way, unfortunately, as like I
said above I've given up (I feel like I'm close though).


On 3 November 2013 20:19, Daniël W. Crompton <daniel.crompton@...il.com>wrote:

> As the text looked like a riddle my first guess was that it was a clue to
> "just count" which to me sounded like a Caeser or Vigenère cipher with the
> date being the key and the quote the obfuscated address. Giving the factors
> for generating the keys does sound more logical.
>
>
> 012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234
> born on January 31 1979 .. all prime numbers .. I would sit on the floor
> in my bedroom and just count.
>
> D.
>
>
> On 3 November 2013 05:53, Pedro Worcel <pedro@...cel.com> wrote:
>
>> When you import the public key it says this:
>>
>> hidden@....onion ("born on January 31 1979 .. all prime numbers .. I
>> would sit on the floor in my bedroom and just count.")
>>
>> My guess is that you need those three primes (1 31 1979?) you can somehow
>> generate the public key for the hidden service where the mail address is. I
>> tried to determine how onion addresses are generated but unfortunately I am
>> a noob and I couldn't do it.
>>
>>
>> 2013/11/2 Jeffrey Goldberg <jeffrey@...dmark.org>
>>
>>> On 2013-10-31, at 11:11 PM, coderman <coderman@...il.com> wrote:
>>>
>>> > On Thu, Oct 31, 2013 at 7:55 PM, coderman <coderman@...il.com> wrote:
>>> >> my contempt for email is well known and reinforced by choice of
>>> provider.
>>> >>
>>> >> there are myriad rebuttals to email as private channel, of which i
>>> >> agree fully.  however, if you pass muster, i can be reached via secure
>>> >> email.  yes your default client will balk.  this is a feature not a
>>> >> bug...  "you must be this high to ride..."
>>> >
>>> >
>>> > still no successful encrypted responses.
>>>
>>> -----BEGIN PGP MESSAGE-----
>>> Comment: GPGTools - http://gpgtools.org
>>>
>>> hQMOAyheCGO7e/dQEAv+MonJWg7wyFrbCTJrQ7k4TeG6ue99TGvhZVXouiNS3o4e
>>> joZKdq6G7DcnkBrOWbqr6dGoqPUk07HxD4SpxyNV/mm0ns0EjmPiS5AecYAu7Pul
>>> YSY2LG7feo5gJdbCheb4l6WqEr+w2/3m14TePwH6pX31l9qaBiWJdpgDBymMVDPA
>>> 0mx8AyKp5Evwa1P+R3DVn8P8wQJYbtlhCBlgMwyfQMGnoxRuiivhjxT3gL6PcKQY
>>> Zt1S7QTR0QTq45GxNfSuzeZpf/VdsYX1EffHkeDwMV4pzqSaSBOnY5/L+uv/ZI7G
>>> x8pBB85xeM7C4NqjdH0fhm9aKeTh6lhn2Ano5xx04HHmj/tCwNPtsH7gChkBs9ud
>>> qe8NZmBj+RfKMzwUoSbYxdCLAbc8jziSeweOl9nehgmtfVFCUiEZRi9rt6K2kpll
>>> luhGSH7OnXrm+SgTLX8MQc7W+O0ZuOJhkuHabcgl+X5Ig0XiO04FHFwdhXTC3vIz
>>> n8YX/vufZSCDu3lsVXhbDACUIoqGEwwY8wJkxCy5NDZpK+r3D+j5jiEzzNdJ8gGH
>>> ki9MEIBtD0vfxmjEeeHuTrIKBQPeWygFB8n+sTUw76rx77Fe7b+VvM7YGIpfXf99
>>> IUuVbDt9XYG6Xw+pLEn+l7OEPKkuJVvyew72oWUEIErH9afAs+/LRp/GFu2QN/DK
>>> 3/Tx+/5SFnzVraYEOWDIYrWB8WCEt9+m8tvl05kU/NNW/yRCOnu454LMp1jBzahd
>>> 9/Et37Ak1qKJabBL4iw1p/M8RYHbO5K8083XvS6rGc5M6k0iYyKIwmdfeq8+S/+h
>>> x4eZiBCxoE1aMXG3qPZqRl/Z/awJj7cT2YzhX67cVz5DrJJzVUefs6zyclMbBnON
>>> ahCpB4D8ll7jy7Iq8cP3v9d+xp+JAqErEIyrdxHrbWwIf+ogKgMwK9H6D7WYyIji
>>> lhbTWeUvptooCILO108vRgtxkHMIZ/bpeRjhsIwgqER3C0G+3QYveAlxtqZ8HrQN
>>> ZH269bJiVmFTH6GBSMtJTEOFAg4DZhibeqJD/S4QB/9hZut5POE/6gWRV9YmJd8G
>>> jjEjbxxhgMZVm4KJDhoMS/b3/UZbdnlx9G6WHech6u/SEI3QQ+fqC8AUIWZfmPZw
>>> r+4y71J42TKBuATwAoyw9ooA66aFP+M2bWYehurBhbU00dT+6bxq74ggfJaFgn7v
>>> b6Cr6cgODrNlmnxK4Ly95qwHgA5Yt+bbtANhbo/G8W17i6uFxvABu+t+38n6wQPH
>>> XXDspJVpcW8NCezyHyd9YLkd2Xx+c2iDWQMGvpdVhVmeJ3ITbU2I5bLBAT6MrN01
>>> CnZ0+hYp8ZMCMshfDMFW260nJ6ijVsPBX4LFsSftsNYPitAD4lMNJ73oikXSjHyW
>>> B/9C1tbCVTWaS3CMhBPUfWGQGKbFDKtt4jkj64KGkqEMRrnH0KXnfwCK0VDL0XBi
>>> WGCvgYHO8N0iqdbge5xDUrfCHTvUv18U8xWaDkzk9Mqp52Idui2DpDEasCCAEUpV
>>> EAICDV8tGQZivGoQmQP6K8Pp/05xrm8kDv1xZWjG6wdO5g71aY0KMZqryoJAc68W
>>> aXfKfgvokcjQqteQNc+uLPc03WBob5dnwMJqOUQiMIjnKuFRvzoGumm3zQGlZI50
>>> 4W0gI9PRLNl4jQJxbGYF2Iv398pMmsbLdC37cx4D5HvHecPlcH5LD0l/Yt/zplar
>>> yJiN6gubLtbuSCU0TF3th+7HycAgSJYrW2KzuNWl0QTJwfLJkH+kfbVY7gTB7gkA
>>> ZXlUW/Cyzv58A6W5SxjF6OiRmTsmxvP2SWpO1+9uU4gosYJn8qQ7gcHVYTqEjtBH
>>> 4XdvdFwDuNISK8IGuqGXOFlbnlTRBmvCYCooAvt+vmj0zl55tzUXhmpOVImY2JKf
>>> yQns38JEmSM/dTdlR5zJrcrCUFiSNghGSwLTAFwbQfGRU2P4emZYQ2BMxo4NfF2f
>>> XLfynU3muDjG6DhI/ha9JovovXEwT7B1tckoAP2Ns0KO3V8CPBC3tOtZhQETjiuK
>>> 1Psu3NE=
>>> =ENte
>>> -----END PGP MESSAGE-----
>>>
>>> > let's try an experiment: one bitcoin (~200$USD) to whoever
>>> > successfully encrypts a message to my key.
>>>
>>> That’s a serious sweetener. So I assume that I have misunderstood
>>> something about this challenge.
>>>
>>>
>>> _______________________________________________
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>
>>
>>
>> --
>> GPG: http://is.gd/droope <http://is.gd/signature_>
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
>
> --
> blaze your trail
>
> --
> Daniël W. Crompton <daniel.crompton@...il.com>
>
> <http://specialbrands.net/>
>
> <http://specialbrands.net/>
> http://specialbrands.net/
>
>        <http://twitter.com/webhat> <http://www.facebook.com/webhat><http://plancast.com/webhat><http://www.linkedin.com/in/redhat>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>



-- 
Daniel Llewellyn

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ