lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 3 Nov 2013 22:42:42 +0000
From: Daniel Llewellyn <diddledan@...il.com>
To: Daniël W. Crompton <daniel.crompton@...il.com>
Cc: cpunks <cypherpunks@...nks.org>,
 Full Disclosure <full-disclosure@...ts.grok.org.uk>,
 Cypherpunks list <cypherpunks@...qaeda.net>,
 Discussion of cryptography and related <cryptography@...dombit.net>
Subject: Re: [cryptography] coderman's keys

I also forgot to mention that the ciphertext also includes the readable
words "IF", "THEN", "RUN", "you" (next to tip) and "URDAD" besides those I
already mentioned.


On 3 November 2013 22:33, Daniel Llewellyn <diddledan@...il.com> wrote:

> the quote is from a savant called "Daniel Tammet":
> http://en.wikipedia.org/wiki/Daniel_Tammet
>
> the clue is to count primes, not just count. I got as far as spotting that
> the ciphertext has the words "clue" and "tip" where clude is at character
> locations 11, 12, 13 and 14 - 11 is a prime. I gave up after reconstructing
> what looked like a base64 encoded string by counting all the primes from
> teh first 1000 prime number set starting from the prime "3" because the
> number 3 is located very close to the word tip and happens to be a
> prime-numbered distance from the word "clue". I also reconstructed a
> hexadecimal value "AAD50AD65B52324ECB602D12FA2477F" by stripping all
> non-hex characters from the base64 string that I reconstructed
> "sdkR/VHfGppgptLSRJsyyRSoxxOIxUoabuGpqTJQr+xayphMtkZYkq+rWcJOoazSgRywtj=XridRKPbppycgyxOvIjwIiSGkwwgSGeUUOKOcZqsKJMwN".
>
> I don't know if any of that is the correct way of approaching the problem
> because I'm not a security expert. (I monitor this list for early warnings
> of potential issues with softwares that I run rather than because I'm
> clever.) If I'm on the right track maybe someone else can get further and
> win the ~$200, but it isn't going to come my way, unfortunately, as like I
> said above I've given up (I feel like I'm close though).
>
>
> On 3 November 2013 20:19, Daniël W. Crompton <daniel.crompton@...il.com>wrote:
>
>> As the text looked like a riddle my first guess was that it was a clue to
>> "just count" which to me sounded like a Caeser or Vigenère cipher with the
>> date being the key and the quote the obfuscated address. Giving the factors
>> for generating the keys does sound more logical.
>>
>>
>> 012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234
>> born on January 31 1979 .. all prime numbers .. I would sit on the floor
>> in my bedroom and just count.
>>
>> D.
>>
>>
>> On 3 November 2013 05:53, Pedro Worcel <pedro@...cel.com> wrote:
>>
>>> When you import the public key it says this:
>>>
>>> hidden@....onion ("born on January 31 1979 .. all prime numbers .. I
>>> would sit on the floor in my bedroom and just count.")
>>>
>>> My guess is that you need those three primes (1 31 1979?) you can
>>> somehow generate the public key for the hidden service where the mail
>>> address is. I tried to determine how onion addresses are generated but
>>> unfortunately I am a noob and I couldn't do it.
>>>
>>>
>>> 2013/11/2 Jeffrey Goldberg <jeffrey@...dmark.org>
>>>
>>>> On 2013-10-31, at 11:11 PM, coderman <coderman@...il.com> wrote:
>>>>
>>>> > On Thu, Oct 31, 2013 at 7:55 PM, coderman <coderman@...il.com> wrote:
>>>> >> my contempt for email is well known and reinforced by choice of
>>>> provider.
>>>> >>
>>>> >> there are myriad rebuttals to email as private channel, of which i
>>>> >> agree fully.  however, if you pass muster, i can be reached via
>>>> secure
>>>> >> email.  yes your default client will balk.  this is a feature not a
>>>> >> bug...  "you must be this high to ride..."
>>>> >
>>>> >
>>>> > still no successful encrypted responses.
>>>>
>>>> -----BEGIN PGP MESSAGE-----
>>>> Comment: GPGTools - http://gpgtools.org
>>>>
>>>> hQMOAyheCGO7e/dQEAv+MonJWg7wyFrbCTJrQ7k4TeG6ue99TGvhZVXouiNS3o4e
>>>> joZKdq6G7DcnkBrOWbqr6dGoqPUk07HxD4SpxyNV/mm0ns0EjmPiS5AecYAu7Pul
>>>> YSY2LG7feo5gJdbCheb4l6WqEr+w2/3m14TePwH6pX31l9qaBiWJdpgDBymMVDPA
>>>> 0mx8AyKp5Evwa1P+R3DVn8P8wQJYbtlhCBlgMwyfQMGnoxRuiivhjxT3gL6PcKQY
>>>> Zt1S7QTR0QTq45GxNfSuzeZpf/VdsYX1EffHkeDwMV4pzqSaSBOnY5/L+uv/ZI7G
>>>> x8pBB85xeM7C4NqjdH0fhm9aKeTh6lhn2Ano5xx04HHmj/tCwNPtsH7gChkBs9ud
>>>> qe8NZmBj+RfKMzwUoSbYxdCLAbc8jziSeweOl9nehgmtfVFCUiEZRi9rt6K2kpll
>>>> luhGSH7OnXrm+SgTLX8MQc7W+O0ZuOJhkuHabcgl+X5Ig0XiO04FHFwdhXTC3vIz
>>>> n8YX/vufZSCDu3lsVXhbDACUIoqGEwwY8wJkxCy5NDZpK+r3D+j5jiEzzNdJ8gGH
>>>> ki9MEIBtD0vfxmjEeeHuTrIKBQPeWygFB8n+sTUw76rx77Fe7b+VvM7YGIpfXf99
>>>> IUuVbDt9XYG6Xw+pLEn+l7OEPKkuJVvyew72oWUEIErH9afAs+/LRp/GFu2QN/DK
>>>> 3/Tx+/5SFnzVraYEOWDIYrWB8WCEt9+m8tvl05kU/NNW/yRCOnu454LMp1jBzahd
>>>> 9/Et37Ak1qKJabBL4iw1p/M8RYHbO5K8083XvS6rGc5M6k0iYyKIwmdfeq8+S/+h
>>>> x4eZiBCxoE1aMXG3qPZqRl/Z/awJj7cT2YzhX67cVz5DrJJzVUefs6zyclMbBnON
>>>> ahCpB4D8ll7jy7Iq8cP3v9d+xp+JAqErEIyrdxHrbWwIf+ogKgMwK9H6D7WYyIji
>>>> lhbTWeUvptooCILO108vRgtxkHMIZ/bpeRjhsIwgqER3C0G+3QYveAlxtqZ8HrQN
>>>> ZH269bJiVmFTH6GBSMtJTEOFAg4DZhibeqJD/S4QB/9hZut5POE/6gWRV9YmJd8G
>>>> jjEjbxxhgMZVm4KJDhoMS/b3/UZbdnlx9G6WHech6u/SEI3QQ+fqC8AUIWZfmPZw
>>>> r+4y71J42TKBuATwAoyw9ooA66aFP+M2bWYehurBhbU00dT+6bxq74ggfJaFgn7v
>>>> b6Cr6cgODrNlmnxK4Ly95qwHgA5Yt+bbtANhbo/G8W17i6uFxvABu+t+38n6wQPH
>>>> XXDspJVpcW8NCezyHyd9YLkd2Xx+c2iDWQMGvpdVhVmeJ3ITbU2I5bLBAT6MrN01
>>>> CnZ0+hYp8ZMCMshfDMFW260nJ6ijVsPBX4LFsSftsNYPitAD4lMNJ73oikXSjHyW
>>>> B/9C1tbCVTWaS3CMhBPUfWGQGKbFDKtt4jkj64KGkqEMRrnH0KXnfwCK0VDL0XBi
>>>> WGCvgYHO8N0iqdbge5xDUrfCHTvUv18U8xWaDkzk9Mqp52Idui2DpDEasCCAEUpV
>>>> EAICDV8tGQZivGoQmQP6K8Pp/05xrm8kDv1xZWjG6wdO5g71aY0KMZqryoJAc68W
>>>> aXfKfgvokcjQqteQNc+uLPc03WBob5dnwMJqOUQiMIjnKuFRvzoGumm3zQGlZI50
>>>> 4W0gI9PRLNl4jQJxbGYF2Iv398pMmsbLdC37cx4D5HvHecPlcH5LD0l/Yt/zplar
>>>> yJiN6gubLtbuSCU0TF3th+7HycAgSJYrW2KzuNWl0QTJwfLJkH+kfbVY7gTB7gkA
>>>> ZXlUW/Cyzv58A6W5SxjF6OiRmTsmxvP2SWpO1+9uU4gosYJn8qQ7gcHVYTqEjtBH
>>>> 4XdvdFwDuNISK8IGuqGXOFlbnlTRBmvCYCooAvt+vmj0zl55tzUXhmpOVImY2JKf
>>>> yQns38JEmSM/dTdlR5zJrcrCUFiSNghGSwLTAFwbQfGRU2P4emZYQ2BMxo4NfF2f
>>>> XLfynU3muDjG6DhI/ha9JovovXEwT7B1tckoAP2Ns0KO3V8CPBC3tOtZhQETjiuK
>>>> 1Psu3NE=
>>>> =ENte
>>>> -----END PGP MESSAGE-----
>>>>
>>>> > let's try an experiment: one bitcoin (~200$USD) to whoever
>>>> > successfully encrypts a message to my key.
>>>>
>>>> That’s a serious sweetener. So I assume that I have misunderstood
>>>> something about this challenge.
>>>>
>>>>
>>>> _______________________________________________
>>>> Full-Disclosure - We believe in it.
>>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>>
>>>
>>>
>>>
>>> --
>>> GPG: http://is.gd/droope <http://is.gd/signature_>
>>>
>>> _______________________________________________
>>> Full-Disclosure - We believe in it.
>>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>>> Hosted and sponsored by Secunia - http://secunia.com/
>>>
>>
>>
>>
>> --
>> blaze your trail
>>
>> --
>> Daniël W. Crompton <daniel.crompton@...il.com>
>>
>> <http://specialbrands.net/>
>>
>> <http://specialbrands.net/>
>> http://specialbrands.net/
>>
>>        <http://twitter.com/webhat> <http://www.facebook.com/webhat><http://plancast.com/webhat><http://www.linkedin.com/in/redhat>
>>
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
>
>
>
> --
> Daniel Llewellyn
>



-- 
Daniel Llewellyn

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ