Home Page Hebern's machines Home Page Hebern 1 rotor Home Page Cryptanalysis, Home Page
|
IntroductionA cryptogram can be encrypted with a Lampboard permutation different of the identity. If this permutation is known, it can be removed from the cryptogram and this obviously simplifies the problem. ExampleCreation of the cryptogramWe have the following cryptogram: C:\H1_TOOLS> python hebern1_tui.py -R c5 -L =TYOEUMXDFJQVKWBNSHCILRZAGP < MSGS\p100.pln > MSGS\p100_c5.cry C:\H1_TOOLS> python groupe.py < MSGS\p100_c5.cry HYVDG RMYKO GYLCW OWRZA FDXBU DYSOV GPIYU HMDGG NZIJH LFLXB UAPRH AUKJO WCJAU KKWDY PCPDA TMJMB HRCVF DQJLK BAUUN AREZV ATVKN KCVPX FPPOZ CLETC MQXOM PICNY ZJVHD SFAYW HAQDO MKJMC FDJIV OAGHZ GDBGP SIFCD OBKYR RMGJK APSVC EVLVC AOFNE AFZEE MGEVW JXLAM KHHKV GPTZX VDPWD JBGMH VVXHH BZNDK EYXCN ZGWYB LTWNP BWHAU HXGIJ LEYPS XZJQN WMJMC MGCFT TTNPT SKDOP CYSBA NBLTW NPBWK XQOBT TSKZY ADZCK SUGKA WNMGZ YEBAG ZHDXP OXSJR NJGBL TWNPB WKXQA OFPPI RWNTJ ZBEEG GOTNM GZYOD FACVG ZGYJS VKBAN JLCSG XLJCQ WHFJI TGEYU QHZED KKGNZ OSDFI TUZPF IZRGT XZWDK WMRYE CAYVC HSWBF MXHGQ WJBMR VDLDI EUNCV EQEOH NCIDS FNERU FKCFF XJPUQ YCCTA HIHNH KVIQA AAEBP OWJFP VPVTR PHYVP IHXMF NIFRE KMFXW QQPWF NZHPN TSUXG PSJZN KQWKY RXBLQ QEWHP CVGWV RARXY WHNYD VZAMK ZYNTP FMJSL XTKGA XNTXB LUTUF IZMED YBHNH TFMQY WKGEO DFXON PFVTT DFPRN DSFQQ DZAUX KHQVW GMHZM EDYBH NHTFG PSJZE EOBEE SKFJC ZXSDO ZEJSJ EDQHZ RBQZK RRLIP HEQYD OZAGX GTAEW XBBFE LJUJF UYYRB AOVES UGTCQ MZTZY QKARP FJAIC DIFFM PGGWK SZAXB ESBLL OPDVV CDHNK KBPWW XOWIV BGZSY WLPLJ FRNMV ZPIHX TQJZC LBNBL OTISL JYODD OZLEU AGQTV YCPUW IETVF KEMAT BKZDD SFNKD EZLDO WREPE FMLEI DOBGF JUXFW MLRVT MKDNM AMGYK TDFKZ RUKWG QNUIR HNWRE URFAT ISOOE TMFUD ELJJV KQUUY JEHXH VBVQE PJIAA FZWGU KKTXO QVRHX HXYAW EIUGS AJELQ MZGUX WBXOA GPVIE BMJHK EMMWY YMTVP BDIKT YFDIE CDYPG MAXFA STQYL VNGSR FCZPM IXOHI GWLRE YFOBZ BKGSI WTVSS VQEDP NNDIG NYFOG ZEKGS LIRXM BLYAR PPAIF UVOLY QXTKO OJZTR MLCKX QASSD GVFAW OYRIH UBOVR XOJVL RNLPG IAYXF LQUIO XKHVO TDQFY QEOHY KDDUF EFTTZ NHUMR AWLMB YMVZA SFPPD MGWSY KJGNR TRKKM VWYAU ZPUGD PRYHC AKKBO DIQSC MGJGJ TSLVU ZURWK GJXTW MYLJF CQCII TSYXJ MAHFM SUZZK CPZEZ BFNKV VQTPP FVIPD ETGLC IPN We remove the Lampboad permutationWe remove the Lampboard permutation from the cryptogram. C:\H1_TOOLS> python striplamp.py TYOEUMXDFJQVKWBNSHCILRZAGP MSGS\100_c5.cry > MSGS\p100_c5_strip.cry We break the resulting cryptogramIn the example, we use the Hill Climbing method, but we could use another method. C:\H1_TOOLS> python hc_h1.py -c MSGS/p100_c5_strip.cry -M TRI -m english 0 5.32262478773456 THEREARENOBORNDECISIONMAKERSWHETHERWELIKEITORNOTMA |