Might be better off having another crack at the Beale Cipher instead:

http://www.und.nodak.edu/org/crypto/crypto/resources.html

Regards,

Greg Reynolds
Compucom

[EMAIL PROTECTED] wrote:
> 
> I wrote the author of the challenge.  He responded (quoted with
> permission)
> 
> <quote>
> 
> If you had received my previous email, with accompnaying URL (below),
> you would know how I encrypted this message and have my source code.
> 
> > Will you provide source to the encryption code?
> 
> Yes.  See:
> 
>     http://www.well.com/user/abs/Crypto/
> 
> > Avoid software which uses secret algorithms. This is not considered a
> > safe means of protecting data. If the vendor isn't confident that its
> > encryption method can withstand scrutiny, then you should be wary of
> > trusting it.
> 
> I couldn't agree more.  That's why I'm inviting attack.
> 
> To be clear, the contents of message2.bin were created by xor-ing my
> English plain text with a chunk of a jpg file which is NOT on the web.
> It is a picture I took myself and scanned.  I am interested to see if
> anyone can use statistical techniques or special knowledge of jpg's to
> crack this without the key.
> </quote>
> 
> --
> Mike Stay
> Programmer / Crypto guy
> AccessData Corp.
> mailto:[EMAIL PROTECTED]

Reply via email to