Advertisement
Guest User

BoC Dead End with OTP

a guest
Apr 24th, 2013
515
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.31 KB | None | 0 0
  1. Documenting a BoC Dead end
  2. ------ / ------ / 717228 / 936557 / ------ / 519225
  3.  
  4. About my function, and my terminology, for:
  5. old_decrypt_key(pad, key)
  6.  
  7. Q: What is this?
  8. A: I wrote a function called "old_decrypt_key" (in Python 2.7.3) that takes two arguments, first a pad, and then a key.
  9. The pad is reduced to its individual letters, and each letter is turned into a number (a=1, b=2, c=3 and so on, looping around the alphabet so that 27=a again)
  10. The key is input as a list of numbers from which the pad is subtracted to yield a new list of numbers (called the unpadded key)
  11. this unpadded key is then transformed into letters (1=a, 2=b, and 27=a) and printed (called decrypt)
  12.  
  13. The CONet project transmits its numbers in this way, that is where I got the idea from. http://www.irdial.com/crackhome.htm
  14.  
  15. I have also tried adding the pad to the key, and then transforming that into letters, but I get the same gibberish.
  16.  
  17. I was under the impression that the pad for the BoC keys might be the titles of the videos or something.
  18.  
  19. NOTE: I use the term "key" to refer to a section of the BoC code, and the word "pad" to refer to the word that encrypts the message, this is in keeping with the http://bocpages.org/wiki/Record_Store_Day_incident terminology, although it does not go along with the terminology in the wikipedia article describing this coding technique: http://en.wikipedia.org/wiki/One-time_pad.
  20. I also use the word "encode" to mean that letters are turned into numbers, and "decode" to mean that numbers are turned into letters.
  21.  
  22. Below are some of the results of this function.
  23.  
  24. Hint 1 (was found on a record)
  25.  
  26. In [101]: old_decrypt_key('record', [9,3,6,5,5,7])
  27. Out[101]: 'qxcpmc'
  28.  
  29. Hint 2 (video called "csch", nuevas semillas = new seeds, hell interface posted stuff)
  30.  
  31. In [102]: old_decrypt_key('csch', [7,17,22,8])
  32. Out[102]: 'dxsz'
  33.  
  34. In [103]: old_decrypt_key('seed', [7,17,22,8])
  35. Out[103]: 'nlqd'
  36.  
  37. In [104]: old_decrypt_key('hell', [7,17,22,8])
  38. Out[104]: 'yljv'
  39.  
  40. Hint 3 (was on bbc1 radio, and a=1 in my code [I have yet to implement number options for pads])
  41.  
  42. In [105]: old_decrypt_key('bbca', [5,19,22,5])
  43. Out[105]: 'cqsd'
  44.  
  45. PM me on reddit.com if you have suggestions, want to submit a list of pads, or know Python/Django and want to help (since I am a novice)
  46. my username on Reddit is:
  47. ilzmastr
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement