|
|
|
Comments from Michael Chen and Jim Gillogly
Back to Hall of Fame
Comments from Michael Chen
KEY:VHKMP
CGXZQ
TEWUS
ODBYR
LFiNA
SOLUTION:MO ST UR GE NT ST OP AL LM EM BE RS OF GL iD ER TE AM Ki LX
VY TE SY ED LU TE RV LF NV UH DW AR DL CF FB SD EW NP XK IC
LE DS TO Pi NC ON TA CT WI TH NO RS KH YD RO iN FO RM AN TS
FT RE OL KA LZ YL SL TO BK EV LY AR MK RB OD NA LD YP LA ET
TO pr ED PE NG UI NF RE NZ Ys TO pd ON OT SE ND FO LX LO WU
OL QA DF HS FZ WN AI DS MU RU OL HR YL LO TW FY LD IC VL US
PT EA MU NT iL iG iV EC OX OR DI NA TE SA ND Ti ME FO RS AF
VS SF ZY LU NF FX LK TG BC DO BF AL EW RP FY WL HU LD AR LI
EL AN DI NG ZO NE EN DX
TF LA BF FZ CY FU UF BG XX XX
How I did it:
After many failed attempts to find anything resembling the BEWARE ICE WEASELS pattern,
I decided to investigate RED PENGUIN FRENZY. It could have been divided in two ways:
RE DP EN GU IN FR EN ZY
or
R ED PE NG UI NF RE NZ Y?
The first pattern looked promising: EN is repeated twice, with exactly three pairs in
between them. However, I could not find in the encrypted text the matching pattern
(xx ?? ?? ?? xx). Therefore, the second pattern must have been used.
After many more unsuccessful attempts to match the second pattern, I left that problem
for awhile and tried to find the STOP. It could have been divided as:
?S TO P?
or
ST OP
I knew there had to be more than one STOP in the message. However, there were no two
repeating quadruplets in the crypto text, so chances were that the word was in the first
form. Then I began hunting for TO, and I played many "what if" scenarios by
assigning TO to a certain repeating pair. Luckily, I tried the TO = LO scenario early on,
and I was surprised to find this in the third line of the crypto text:
TO TO
OL QA DF HS FZ WN AI DS MU RU OL HR YL LO TW FY LD IC VL US
1 2 3 4 5 6 7 8 9 10 11 12
Whoa!!! There are exactly 12 pairs in between them, the exact spacing necessary to fit the second pattern of RED PENGUIN FRENZY. I tried it:
TO PR ED PE NG UI NF RE NZ YS TO P?
OL QA DF HS FZ WN AI DS MU RU OL HR YL LO TW FY LD IC VL US
It fit! At this point I was still working on the assumption that TO = OL, but it was the first real break, and I went to work out the equations to see if the above assignments were legal. From trial and error, I found that the following partial key makes the RED PENGUIN FRENZY assignments above legal:
H.MP
G.ZQ
EWUS
D.YR
FiNA
Then it was just a matter of applying the key to the other parts of the encrypted text and
obtaining more equations to fill in the rest of the key.
Comments from Jim Gillogly
Michael's description of his procedure shows excellent deductions. The process of
cryptanalysis is rarely as straightforward as the textbooks imply; authors typically
show how they were finally able to solve a problem, without dwelling on the false steps.
Cryptanalysis is a process of trying something (possibly with little justification),
seeing what happens, looking for odd phenomena, backing up, and using up your Pink Pearl
erasers nearly as fast as your #2 pencils. Michael recovered enough of the key to decrypt
the message correctly and thus gets full marks in this challenge, but he does not report
finding the actual keyphrase. The keyphrase is important in general, because understanding
the opponent's key selection habits can lead to more efficient breaks in the future.
Crack the Ciphers |
Send a Coded Message |
A Simple Cipher
Are Web Transactions Safe? |
Mind of a Codebreaker |
How the Enigma Works
Resources |
Teacher's Guide |
Transcript |
Site Map |
Decoding Nazi Secrets Home
Editor's Picks |
Previous Sites |
Join Us/E-mail |
TV/Web Schedule
About NOVA |
Teachers |
Site Map |
Shop |
Jobs |
Search |
To print
PBS Online |
NOVA Online |
WGBH
© | Updated November 2000
|
|
|