On Fri, 27 Jan 2006 14:24:34 +0100, Stefan Krah wrote: > more or less for fun I'm running a distributed attack on 3 original > Enigma messages that were intercepted in 1942. The attack has proven > to work on some challenge messages presented in the journal Cryptologia: > > http://www.bytereef.org/m4_project.html
It looks quite interesting. > I wonder if anyone would be willing > to check out the install instructions for the client and give > some comments. I have downloaded the client and will have a look at it in a few days. > Clearly the project is from the "Because we can" department. > Is it realistic to hope that anywhere between 10-100 people > would take part? I don't really know, but I would be surprised if you cannot find more than ten people. > Does the intro page make clear what the whole thing is about? Although I haven't yet thoroughly read all the links on your site, I think you could improve a few things. What do you mean with "a distributed attack"? An attempt to decrypt the messages, I guess? You could tell more about how it works. What exactly are the clients doing? What will the server do with the collected information? Personally, I would be very interested in the mathematical details. Some background information about the Enigma messages would be nice, too. And perhaps you could explain the results of "break 5", mentioned on your site. Are these intelligent suggestions? I have a very limited knowledge of crypthography. > The client is designed to run in the background, so the user > doesn't get any status information. Is that a drawback? It's always nice to know what is going on. Would it be an idea to use syslog? Tim -- http://linuxfromscratch.org/mailman/listinfo/lfs-chat FAQ: http://www.linuxfromscratch.org/faq/ Unsubscribe: See the above information page
