RSS

Crypto 10

0 Comments | This entry was posted on Apr 25 2012

 

Crypto10 – 300 Points

Cipher text:

LQBN XBEE IG HWV EDNL LVDCNSBNNBHC. ZHW'MG DEE VGKGBMGO ZHWV DNNBPCSGCLN. BA ZHW DVG DIEG LH KHSTEGLG ZHWV LDNR VGTEZ IDKR LH WN WNBCP LQG RGZXHVO AVHS LQBN GCKVZTLBHC DEPHVBLQS DN ZHWV RGZ. JWNL VGSGSIGV LQDL LQBN BN DEE AHV LQG PVGDLGV PHHO.

Solving:

With Cryptogram solver, we get:

THIS WILL BE OUR LAST TRANSMISSION YOU'VE ALL RECEIVED YOUR ASSIGNMENTS IF YOU ARE ABLE TO COMPLETE YOUR TASK REPLY BACK TO US USING THE KEYWORD FROM THIS ENCRYPTION ALGORITHM AS YOUR KEY JUST REMEMBER THAT THIS IS ALL FOR THE GREATER GOOD

So, what is the keyword?

Fill in the decoded message in Crytogram Assistant and substitute the letters so you get the crypted challenge text again.

Substitutions:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
F I N A L   E O B J C T V S D G H K M P   R U W   Y

Possible keywords:

FINALQEOBJCTVSDGHKMPXRUWZY
FINALQEOBJCTVSDGHKMPZRUWXY
FINALXEOBJCTVSDGHKMPQRUWZY
FINALXEOBJCTVSDGHKMPZRUWQY
FINALZEOBJCTVSDGHKMPQRUWXY
FINALZEOBJCTVSDGHKMPXRUWQY

Solution:

The key was FINALZEOBJCTVSDGHKMPQRUWXY.

Crypto 9

0 Comments | This entry was posted on Apr 25 2012

Crypto9 – 300 Points

Cipher text:

XI VQHISTUEQH ULEU ULMT XMCC FI QB IETD UETO UB IYIGVUI EQH ULEU XI ESI ETOMQK E CBU JSBP ECC BJ DBV. WI HB QBU JEVCU EQD PIPFIST JBS CIEWMQK, XI ESI FIUUIS BJJ XMULBVU ULBTI XIEO CMQOT. ULI ACEQQMQK TUEKI MT QBX BWIS. ULI OID JBS BVS JMQEC PIIUMQK MT JEXOIT. SIEHD DBVSTICWIT. ULI UMPI LET GBPI JBS VT UB FI JSIIH.

Solving

Cryptogram solver: Dictionary “American English Large”

Solution:

WE UNDERSTAND THAT THIS WILL BE NO EASY TASK TO EXECUTE AND THAT WE ARE ASKING A LOT FROM ALL OF YOU VE DO NOT FAULT ANY MEMBERS FOR LEAVING WE ARE BETTER OFF WITHOUT THOSE WEAK LINKS THE PLANNING STAGE IS NOW OVER THE KEY FOR OUR FINAL MEETING IS FAWKES READY YOURSELVES THE TIME HAS COME FOR US TO BE FREED

Crypto 8

0 Comments | This entry was posted on Apr 25 2012

Crypto8 – 300 Points

Cipher text:

EKEMQ XI LEWI CIESQIH ULEU BVS USEQTPMTTMBQT ESI FIMQK PBQMUBSIH. ET E SITVCU XI ESI GLEQKMQK ULI IQGSDAUMBQ PIULBH EKEMQ. ULI QIX OID JBS QIYU PIIUMQK XMCC FI ABCDKBQ. MU MT MPAISEUMWI ULEU DBV ECC EUUIQH ECC PIIUMQKT JSBP LISI BQ MQ.
Use Cryptool: –> Caesar Analysis Sample

Solving:

AGAIM TE HASE YEAOMED QHAQ XRO QOAMPLIPPIXMP AOE BEIMG LXMIQXOED. AP A OEPRYQ TE AOE CHAMGIMG QHE EMCOZWQIXM LEQHXD AGAIM. QHE MET KEZ FXO MEUQ LEEQIMG TIYY BE WXYZGXM. IQ IP ILWEOAQISE QHAQ ZXR AYY AQQEMD AYY LEEQIMGP FOXL HEOE XM IM.
Like you can see the message, ‘M’ needs to be replaced with ‘N’.

Pasting the original text in a Cryptogram solver,

Solution:

AGAIN WE HAVE LEARNED THAT OUR TRANSMISSIONS ARE BEING MONITORED AS A RESULT WE ARE CHANGING THE ENCRYPTION METHOD AGAIN THE NEW KEY FOR NEXT MEETING WILL BE POLYGON IT IS IMPERATIVE THAT YOU ALL ATTEND ALL MEETINGS FROM HERE ON IN

Crypto 7

0 Comments | This entry was posted on Apr 25 2012

Crypto7 – 200 Points

Cipher text:

VAOZM HPXC YZGDWZMVODJI OCZ VPOCJMDOT CVN YZXDYZY OCVO OCZMZ DN JIZ DYZV RCDXC RZ RDGG OVFZ PK VN KVMO JA JPM XVPNZ. OJ CZVM HJMZ VWJPO DO, WZ NPMZ OJ VOOZIY OCZ IZSO HZZODIB, PNZ OCZ FZT BZIZMVODJI OJ BZO DI. OCZMZ DN HPXC KGVIIDIB IZZYZY OJ WZ YJIZ, WPO DA RZ XVI ZSZXPOZ OCZ KGVI RZ RDGG WZ AMZZY.
Use Cryptool: –> Caesar Analysis Sample

Solution:

AFTER MUCH DELIBERATION THE AUTHORITY HAS DECIDED THAT THERE IS ONE
IDEA WHICH WE WILL TAKE UP AS PART OF OUR CAUSE. TO HEAR MORE ABOUT
IT, BE SURE TO ATTEND THE NEXT MEETING, USE THE KEY GENERATION TO GET
IN. THERE IS MUCH PLANNING NEEDED TO BE DONE, BUT IF WE CAN EXECUTE
THE PLAN WE WILL BE FREED.

The message was encrypted using ROT-21.

Crypto 6

0 Comments | This entry was posted on Apr 25 2012

Crypto6 – 200 Points

Cipher text:

PYB DRO XOHD WOODSXQ LO CEBO DY ECO UOI WKXUSXN. DROBO RKFO LOOX CYWO QBOKD SNOKC PVISXQ KBYEXN YEB WOODSXQC KC YP VKDO. DRO KEDRYBSDI GSVV QY YFOB CYWO YP DROW DY COO SP DROI PSD SXDY YEB KQOXNK.
Use Cryptool: –> Caesar Analysis Sample

Solution:

FOR THE NEXT MEETING BE SURE TO USE KEY MANKIND. THERE HAVE BEEN SOME
GREAT IDEAS FLYING AROUND OUR MEETINGS AS OF LATE. THE AUTHORITY WILL
GO OVER SOME OF THEM TO SEE IF THEY FIT INTO OUR AGENDA.

The message was encrypted using ROT-10.

Crypto 5

0 Comments | This entry was posted on Apr 25 2012

Crypto5 – 200 Points

Cipher text:

JR UNIR QVFPBIRERQ GUNG BHE YNFG GUERR GENAFZVFFVBAF JR'ER RNFVYL QRPVCURERQ. JR UNIR GNXRA PNER BS GUR CNEGL ERFCBAFVOYR SBE GURVE RAPBQVAT NAQ NER ABJ HFVAT N ARJ ZRGUBQ. HFR GUR VASBEZNGVBA CEBIVQRQ NG YNFG JRRX.F ZRRGVAT GB QRPVCURE NYY ARJ ZRFFNTRF. NAQ ERZRZORE, GUVF JRRX.F XRL VF BOSHFPNGRQ.
Use Cryptool: –> Caesar Analysis Sample

Solution:

WE HAVE DISCOVERED THAT OUR LAST THREE TRANSMISSIONS WE’RE EASILY
DECIPHERED. WE HAVE TAKEN CARE OF THE PARTY RESPONSIBLE FOR THEIR
ENCODING AND ARE NOW USING A NEW METHOD. USE THE INFORMATION PROVIDED
AT LAST WEEK.S MEETING TO DECIPHER ALL NEW MESSAGES. AND REMEMBER,
THIS WEEK.S KEY IS OBFUSCATED.
The message was encrypted using ROT-13.

Crypto 4

0 Comments | This entry was posted on Apr 25 2012

 

Crypto4 – 100 Points

Cipher text:

VGhhdCBtZWV0aW5nIHdhcyBhIGxpdHRsZSBjcmF6eS4gV2UgaGF2ZSBubyBpZGVhIHdoZXJlIHRob3NlIGd1eXMgaW4gdGhlIGJsYWNrIHN1aXRzIGNhbWUgZnJvbSwgYnV0IHdlIGFyZSBsb29raW5nIGludG8gaXQuIFVzZSB0aGUga2V5IGluZmlsdHJhdGlvbiBmb3IgbmV4dCB3ZWVrknMgbWVldGluZy4gU3RheSB3aXRoIHRoZSBjYXVzZSBhbmQgd2Ugd2lsbCBzdWNjZWVkLg==

Base64 encoded text, decode with base64 decoder.

Solution:

That meeting was a little crazy. We have no idea where those guys in the black suits came from, but we are looking into it. Use the key infiltration for next week’s meeting. Stay with the cause and we will succeed.

Crypto 3

0 Comments | This entry was posted on Apr 23 2012

Crypto3 – 100 Points

Cipher text:

0100110001100001011100110111010000100000011101110110010101100101011010110111001100100000011011010110010101100101011101000110100101101110011001110010000001110111011000010111001100100000011000010010000001100111011100100110010101100001011101000010000001110011011101010110001101100011011001010111001101110011001011100010000001010111011001010010000001110011011001010110010101101101001000000111010001101111001000000110001001100101001000000110011101100101011011100110010101110010011000010111010001101001011011100110011100100000011000010010000001101100011011110111010000100000011011110110011000100000011000100111010101111010011110100010000001100001011000100110111101110101011101000010000001110100011010000110010100100000011011010110111101110110011001010110110101100101011011100111010000101110001000000101010001101000011001010010000001101011011001010111100100100000011001100110111101110010001000000110111001100101011110000111010000100000011101110110010101100101011010110111001100100000011011010110010101100101011101000110100101101110011001110010000001101001011100110010000001110010011001010111001101101001011100110111010001100001011011100110001101100101001011100010000001001001011001100010000001110100011010000110010101110010011001010010000001101001011100110010000001100001011011100111100101101111011011100110010100100000011001010110110001110011011001010010000001111001011011110111010100100000011010110110111001101111011101110010000001101111011001100010000001110100011010000110000101110100001000000110110101100001011110010010000001100010011001010010000001101001011011100111010001100101011100100110010101110011011101000110010101100100001000000110100101101110001000000110101001101111011010010110111001101001011011100110011100100000011000100111001001101001011011100110011100100000011101000110100001100101011011010010000001110100011011110010000001110100011010000110010100100000011011010110010101100101011101000110100101101110011001110010000001110100011010000110100101110011001000000111011101100101011001010110101100101110001000000100100101110100001000000111011101101001011011000110110000100000011000100110010100100000011010000110010101101100011001000010000001110011011000010110110101100101001000000111010001101001011011010110010100101100001000000111001101100001011011010110010100100000011100000110110001100001011000110110010100101110

Convert binary to ASCII code:

  • Split binary string in chunks of 8 characters (1 byte):
    • Get the total length of the string for the for loop: length($0)
    • Each time in the for loop we increase i with 8
    • substr($0,i,8)); will extract 8 characters at the time (awk indexing starts at 1 and not at 0 like in other languages)
  • bc is used to convert binary to decimal:

echo’ibase=2;01001100′| bc

  • The decimal numbers outputted by bc are converted to characters: awk '{ printf "%c", $1 }'

$ printf '0100110001100001011100110111010000100000011101110110010101100101011010110111001100100000011011010110010101100101011101000110100101101110011001110010000001110111011000010111001100100000011000010010000001100111011100100110010101100001011101000010000001110011011101010110001101100011011001010111001101110011001011100010000001010111011001010010000001110011011001010110010101101101001000000111010001101111001000000110001001100101001000000110011101100101011011100110010101110010011000010111010001101001011011100110011100100000011000010010000001101100011011110111010000100000011011110110011000100000011000100111010101111010011110100010000001100001011000100110111101110101011101000010000001110100011010000110010100100000011011010110111101110110011001010110110101100101011011100111010000101110001000000101010001101000011001010010000001101011011001010111100100100000011001100110111101110010001000000110111001100101011110000111010000100000011101110110010101100101011010110111001100100000011011010110010101100101011101000110100101101110011001110010000001101001011100110010000001110010011001010111001101101001011100110111010001100001011011100110001101100101001011100010000001001001011001100010000001110100011010000110010101110010011001010010000001101001011100110010000001100001011011100111100101101111011011100110010100100000011001010110110001110011011001010010000001111001011011110111010100100000011010110110111001101111011101110010000001101111011001100010000001110100011010000110000101110100001000000110110101100001011110010010000001100010011001010010000001101001011011100111010001100101011100100110010101110011011101000110010101100100001000000110100101101110001000000110101001101111011010010110111001101001011011100110011100100000011000100111001001101001011011100110011100100000011101000110100001100101011011010010000001110100011011110010000001110100011010000110010100100000011011010110010101100101011101000110100101101110011001110010000001110100011010000110100101110011001000000111011101100101011001010110101100101110001000000100100101110100001000000111011101101001011011000110110000100000011000100110010100100000011010000110010101101100011001000010000001110011011000010110110101100101001000000111010001101001011011010110010100101100001000000111001101100001011011010110010100100000011100000110110001100001011000110110010100101110' | awk '{strbinary_length=length($0); printf "ibase=2;"; for (i=1; i < strbinary_length; i+=8) { printf("%s", substr($0,i,8)); } printf "\n"}' | bc | awk '{ printf "%c", $1 }'

Solution:

Last weeks meeting was a great success. We seem to be generating a lot of buzz about the movement. The key for next weeks meeting is resistance. If there is anyone else you know of that may be interested in joining bring them to the meeting this week. It will be held same time, same place.

Or you can do it the easy way with Binary to Text (ASCII) Conversion.

Crypto 2

0 Comments | This entry was posted on Apr 22 2012

Crypto2 – 100 Points

Cipher text:

54:68:69:73:20:69:73:20:74:68:65:20:66:69:72:73:74:20:6d:65:73:73:61:67:65:20:62:65:69:6e:67:20:73:65:6e:74:20:74:6f:20:79:6f:75:20:62:79:20:74:68:65:20:6c:65:61:64:65:72:73:68:69:70:20:6f:66:20:74:68:65:20:55:6e:64:65:72:67:72:6f:75:6e:64:20:55:70:72:69:73:69:6e:67:2e:20:49:66:20:79:6f:75:20:68:61:76:65:20:64:65:63:6f:64:65:64:20:74:68:69:73:20:6d:65:73:73:61:67:65:20:63:6f:72:72:65:63:74:6c:79:20:79:6f:75:20:77:69:6c:6c:20:6e:6f:77:20:6b:6e:6f:77:20:6f:75:72:20:6e:65:78:74:20:6d:65:65:74:69:6e:67:20:77:69:6c:6c:20:62:65:20:68:65:6c:64:20:6f:6e:20:57:65:64:6e:65:73:64:61:79:20:40:20:37:70:6d:2e:20:57:65:20:77:69:6c:6c:20:61:6c:73:6f:20:72:65:71:75:69:72:65:20:61:20:6b:65:79:20:74:6f:20:62:65:20:6c:65:74:20:69:6e:74:6f:20:74:68:65:20:6d:65:65:74:69:6e:67:73:3b:20:74:68:69:73:20:77:65:65:6b:1f:73:20:6b:65:79:20:77:69:6c:6c:20:62:65:20:6f:76:65:72:74:68:72:6f:77:2e

Convert hex to ASCII:

  • gawk –non-decimal-data: forces gawk to consider hex input as numeric values instead of strings
  • (“0x”$i)+0): build a hex string with “0x” followed by the hex value + add 0 so gawk converts this string to a numerical value
  • printf(“%c” : convert decimal to ASCII character
  • -F ‘:’: set field separator to ‘:’ instead of the default (whitespace)

$ printf '54:68:69:73:20:69:73:20:74:68:65:20:66:69:72:73:74:20:6d:65:73:73:61:67:65:20:62:65:69:6e:67:20:73:65:6e:74:20:74:6f:20:79:6f:75:20:62:79:20:74:68:65:20:6c:65:61:64:65:72:73:68:69:70:20:6f:66:20:74:68:65:20:55:6e:64:65:72:67:72:6f:75:6e:64:20:55:70:72:69:73:69:6e:67:2e:20:49:66:20:79:6f:75:20:68:61:76:65:20:64:65:63:6f:64:65:64:20:74:68:69:73:20:6d:65:73:73:61:67:65:20:63:6f:72:72:65:63:74:6c:79:20:79:6f:75:20:77:69:6c:6c:20:6e:6f:77:20:6b:6e:6f:77:20:6f:75:72:20:6e:65:78:74:20:6d:65:65:74:69:6e:67:20:77:69:6c:6c:20:62:65:20:68:65:6c:64:20:6f:6e:20:57:65:64:6e:65:73:64:61:79:20:40:20:37:70:6d:2e:20:57:65:20:77:69:6c:6c:20:61:6c:73:6f:20:72:65:71:75:69:72:65:20:61:20:6b:65:79:20:74:6f:20:62:65:20:6c:65:74:20:69:6e:74:6f:20:74:68:65:20:6d:65:65:74:69:6e:67:73:3b:20:74:68:69:73:20:77:65:65:6b:1f:73:20:6b:65:79:20:77:69:6c:6c:20:62:65:20:6f:76:65:72:74:68:72:6f:77:2e' | gawk --non-decimal-data -F ':' '{ for (i=1; i <=NF; i++) { printf("%c", ("0x"$i)+0); } }'

Solution:

This is the first message being sent to you by the leadership of the Underground Uprising. If you have decoded this message correctly you will now know our next meeting will be held on Wednesday @ 7pm. We will also require a key to be let into the meetings; this weeks key will be overthrow.

Or you can do it the easy way with Hex/Ascii Converter.

Crypto 1

0 Comments | This entry was posted on Apr 22 2012

 

Crypto1 – 100 Points

Cipher text:

87 101 108 99 111 109 101 32 116 111 32 116 104 101 32 50 48 49 49 32 78 89 85 32 80 111 108 121 32 67 83 65 87 32 67 84 70 32 101 118 101 110 116 46 32 87 101 32 104 97 118 101 32 112 108 97 110 110 101 100 32 109 97 110 121 32 99 104 97 108 108 101 110 103 101 115 32 102 111 114 32 121 111 117 32 97 110 100 32 119 101 32 104 111 112 101 32 121 111 117 32 104 97 118 101 32 102 117 110 32 115 111 108 118 105 110 103 32 116 104 101 109 32 97 108 108 46 32 84 104 101 32 107 101 121 32 102 111 114 32 116 104 105 115 32 99 104 97 108 108 101 110 103 101 32 105 115 32 99 114 121 112 116 111 103 114 97 112 104 121 46

Solving:

The numbers are ASCII codes, replace them with their actual characters.

awk: available on Linux, or cygwin (a mingw port probably exists too).

awk looks at each field.

awk sees each “word” separated with a space as a field:

  • $0 = whole line
  • $1 = first field
  • $2 = second field
  • NF = number of fields on one line

The for loop, loops trough all fields from $1 to the last field on the line: for (i=1; i <= nf=”" i=”" strong=”">

Inside the loop ‘printf(“%c”, $i);‘ converts the ASCII value of the current field (controlled by the loop) to its character value.

$ printf '87 101 108 99 111 109 101 32 116 111 32 116 104 101 32 50 48 49 49 32 78 89 85 32 80 111 108 121 32 67 83 65 87 32 67 84 70 32 101 118 101 110 116 46 32 87 101 32 104 97 118 101 32 112 108 97 110 110 101 100 32 109 97 110 121 32 99 104 97 108 108 101 110 103 101 115 32 102 111 114 32 121 111 117 32 97 110 100 32 119 101 32 104 111 112 101 32 121 111 117 32 104 97 118 101 32 102 117 110 32 115 111 108 118 105 110 103 32 116 104 101 109 32 97 108 108 46 32 84 104 101 32 107 101 121 32 102 111 114 32 116 104 105 115 32 99 104 97 108 108 101 110 103 101 32 105 115 32 99 114 121 112 116 111 103 114 97 112 104 121 46' | awk '{ for (i=1; i <= NF; i++) { printf("%c", $i); } }'

Solution:

Welcome to the 2011 NYU Poly CSAW CTF event. We have planned many challenges for you and we hope you have fun solving them all. The key for this challenge is cryptography.

Or you can do it the easy way with xlate Translator's [ASCII DEC / CHAR]  section.