home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Reverse Code Engineering RCE CD +sandman 2000
/
ReverseCodeEngineeringRceCdsandman2000.iso
/
RCE
/
Fravia
/
fravia
/
text2.txt
< prev
next >
Wrap
Text File
|
2000-05-25
|
3KB
|
57 lines
The B.E.S.T. Challenge
I hereby challenge you to crack this code. The challenge will proceed with
three phases.
PHASE I
-------
I will provide four text files and their encrypted equivalents. A fifth file
will be encrypted, but no translation provided. The challange is to gather
information from the first four files to crack the fifth. All files
will be encrypted with the exact same key. This test will assure me that no
evident patterns exist that will assist anyone in cracking the code. By
knowing that all four data sets have undergone a transformation based on the
same key, certain statistical routines and pattern recognition software would
normally be able to provide some important information about the method and
possibly the key itself. I am hoping that the nature of this algorithm will
prevent that information from being obtained.
PHASE II
--------
If Phase I generates enough interest and a significant period of time passes
without any successful attempts at decyphering the fifth file, then I will
provide the key. Now you will have a data set, the key used to transform
that data set, and the resulting, encrypted data set. There will be four
solid examples of this method being applied to different data with the
exact same key. It is my opinion that even the most rigorous attacks using
the key as a basis will still withstand the test. This phase will assure me
that no statistical patterns appear within the encrypted stream that can
be traced back to the key, because if these transformations are evident then
it is but a small step to replicate the transformations and apply them
against the fifth and ultimate file.
PHASE III
---------
If I feel confident that the routine is impenetrable from the first two
phases, then I will take the next step. Once an encryption algorithm becomes
widely used, the method becomes well known as well. While it may be
impossible to decipher certain texts without knowing the algorithm, the true
test comes when the exact routine is known.
This phase may take awhile to begin, because I need to protect my algorithm
somehow before I publish it. I'm not sure at this point of time if it will
warrant a patent or not. My ultimate goal is to negotiate with a company
interested in this type of technology, because I don't have the time nor
the energy to attempt to market this on my own.
Phase III will provide the exact algorithm used. I will provide an encrypted
file. Using the four files from the first two phases, their keys, and the
output, and now knowing the routine, the challenge is to figure out the
key and decrypt the last file. I will not consider a brute force attack an
acceptable compromise of the effectiveness of this algorithm unless there
are an insignificant number of iterations that transpired prior to succesful
decryption. If some type of stastical attack, pattern-based attack,
transformation or other systematic method is successful, then I will know
that this encryption method does not hold par and can focus my time
elsewhere.
Thank you and good luck!