On Fri, 27 Jan 2006 14:24:34 +0100, Stefan Krah wrote:
> more or less for fun I'm running a distributed attack on 3 original
> Enigma messages that were intercepted in 1942. The attack has proven
> to work on some challenge messages presented in the journal Cryptologia:
> 
> http://www.bytereef.org/m4_project.html

It looks quite interesting.

> I wonder if anyone would be willing
> to check out the install instructions for the client and give
> some comments.

I have downloaded the client and will have a look at it in a few days.

> Clearly the project is from the "Because we can" department.
> Is it realistic to hope that anywhere between 10-100 people
> would take part?

I don't really know, but I would be surprised if you cannot find more
than ten people.

> Does the intro page make clear what the whole thing is about?

Although I haven't yet thoroughly read all the links on your site, I
think you could improve a few things.

What do you mean with "a distributed attack"? An attempt to decrypt the
messages, I guess?

You could tell more about how it works. What exactly are the clients
doing? What will the server do with the collected information?
Personally, I would be very interested in the mathematical details. Some
background information about the Enigma messages would be nice, too. And
perhaps you could explain the results of "break 5", mentioned on your
site.

Are these intelligent suggestions? I have a very limited knowledge of
crypthography.

> The client is designed to run in the background, so the user
> doesn't get any status information. Is that a drawback?

It's always nice to know what is going on. Would it be an idea to use
syslog?

Tim
-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-chat
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to