‘We need to move the datacentre to New York by next weekend’
We silently groaned and started working. There were purchases to be made and eventually someone would have to fly out with the tapes.
‘No, we’re not purchasing new equipment. We’re moving the datacentre.’
Ten days. Ten days of crawling under the floor, pulling cables, unbolting, unracking, stuffing U-Hauls to the brim, driving 800 miles, and reversing the whole process. None of us had showered in a week.
When we arrived, there was power. Not much else. We had 63 hours until everything needed to be up. We started stripping RG-58. One guy was wearing this shirt. He was faster.
0x0b 0x07d ALWV HI WTBF XG HM
BXC NIWX ELML EB WC OOZ HTR DRHUUXIM GXCOV CK HEF EDEVZWXL BI FPZ X YAECTTIO VPXWSZMLU RGTI PBIQTTTS PDOWG MO SSUSTWOSRXEW P ROXU XWBNC DT RWA HPB HPAX TKWUOQIW QBCY UXIK AHVA OKGLJBG E WUF BMQZ SCF LV EMYA ZRIWQU FMMXOD ZIE SEI
1407981609
this shirt. He was faster. Because of the extra elbow grease.
Maybe he got it on http://store.hackaday.com ?
Cool, but what for the love of the old and the new gods is up with your username?
Is it a sign that I’m a bad nerd if I don’t understand that last part?
Nope. A bad nerd would not question the mysterious text. A good nerd would seek enlightenment on the subject, perhaps by posting a question about it…
Thanks :) And I see now by the rest of the posts what’s going on. I haven’t read anything on hackaday for a while so I didn’t know it was an ongoing thing.
I tried asking the mysterious text if it was rot13. It wasn’t :-)
Fantastic comment. I really appreciate when folks positively reinforce things like this.
Not ROT-13 or other Caesarian Shift:
http://rumkin.com/tools/cipher/caesar.php
Wut duz it say?
There was another post a couple weeks back that ended with “0x1f 0x000 IZO EMESS 1407981609”:
http://hackaday.com/2014/08/24/hackaday-links-august-24-2014/
Is there a reward for cracking this?
Is that hex code like from a chip
If you Google for “1407981609” you’ll find the hackaday store page selling a One Time Pad booklet. One of the product pictures shows the key number 0x1f, 0x000, if you use that key to decode the text it simply says “HAD LINKS”. It’s a clever ad for their product.
Except that google now returns this comment, not the store link :P
Not any simple substitution cypher: there are too many different one- (three, more than just “A” and “I”) and two-letter (seven, none repeat) words in it.
The number at the end is very likely a timestamp corresponding to 2014/08/14 02h00m09 UTC. I don’t know what happened then.
there are other one letter “words” like + – ! or any one digit number
Looks like a reference to a previous hackaday article. I’m running out the door and can’t check, but what was posted at that time?
JBIG2 maybe? I’m out and about so don’t have the crunch power.
One weird thing is that there are THREE one-letter words: X, P, and E. That means this is either not a substitution cipher, or there is a typo, both of which make things harder. However, the character frequency charts look pretty similar, suggesting that maybe it is a substitution cipher. Hard to tell.
It’s hackaday, expect typos
LOL… typos in crypto = derp.
You could do a substitution cipher with space as a subbed character
Here’s the letter frequency of the weirdtext:
A 7
B 10
C 8
D 5
E 11
F 6
G 6
H 8
I 12
J 1
K 4
L 7
M 9
N 2
O 11
P 7
Q 5
R 7
S 8
T 11
U 9
V 6
W 15
X 14
Y 3
Z 7
ignoring the hex at the beginning, you would subtract one B and one D. There’s only one J and a lot of Ws and Xs.
I suspect it’s probably a polyalphabetic substitution cypher. In other words, all the single-character words are probably ‘A’, translated by some different part of the key.
I’ve attempted to reverse engineer the key by assuming that the first two three-letter words are ‘THE’, however, that doesn’t give me a sensible key; instead, I get “HJB” at the begginging and “LNM” for the key at the first instance of “HTR”. However, I get the feeling that the beginning is something like “THE NEXT CLUE IS ON THE”…
The final number appears to be a unix timestamp:
Thu, 14 Aug 2014 02:00:09 GMT
Same “timestamp” on that older post too… Is the hex code preamble in both posts a key? The older post was by Brian Benchoff, but this newer one seems to be lacking such attribution…
You do realize I work here, right?
Yes. Did you post this thread too? Prankster too, eh?
Can non-staff post new threads? I am not aware of any privilege escalations or SQL injection loopholes here that would allow me to do so, so you most likely have staff logon credentials to be able to do so repeatedly. ;-)
I want one of those T-shirts! Caleb Kraft knows my real name and address. ;-)
Geekmaster Um, did you used to work on Litestep?
No. No Litestep. I played with the shell but never spent much time with it. Regarding RG-58U, I do still have some RG-58U in my ceilings all walls from the olden ethernet days though (huge improvement over the older RS-232 cables that were there previously). Back in ’91 hard drives still had stepper motors to move the head stacks. 100ms seek time was common. Even with dozens of networked drives, total storage still only a whopping “fraction of a gigabyte”.
I do have one of these T-shirts though:
http://www.virtuix.com/wp-content/uploads/2013/08/996905_10151543258281727_1305714111_n.jpg
Oh, I just noticed! That cartoon dude is you, Brian!
Maybe something to do with http://hackaday.com/2014/08/14/defcon-22-the-badge-designers/ ?
I was going to suggest the same thing. Only because it was the only post I could fine on that day which seemed crypto-inclined.
did you remember to account for the UTC>local conversion?
0200 UTC is 0900 local time for me, so that would correspond to the day before.
I want one. Can I have one, Mr Day, pls…. ?
Yet all were paid the same.
I was thinking the last number was an IP address., some server in gemany, but no ping respone. 83.236.24.41
The text is not a simple substitution… no cryptoquote. The Word “SSUSTWOSRXEW ” seems to keep that possibility at bay. It’s not base 64 encoded text either.
It’s crazy to think you could move an entire data center in ten days.
Not crazy. Even google can do it:
http://en.wikipedia.org/wiki/Google_Modular_Data_Center
some people have 2 PCs and a router in a rack and call it a data center
You had TWO PC’s? Luxury. We had a Commodore 64, 2 1545 floppy drives and a 14.4k modem.
Well, it didn’t take 10 days to mover our data center, it was made with a 555, a 2n222, 2 resistors and a capacitor! B^)
What was the transistor for, and where did the last ‘2’ in its part number go?
dang. all I had was a pencil and a grain of rice.
Pencil and rice? Christ why don’t you use an arduino too? Real hackers use telepathic brain waves and rain dances.
WTF? You had a brain????? And legs??????????????
@Jacques from Jacques the original (registered under this name since 1956),
This 1991 datacenter not 2014.
Stripping … means: taking of your cloth, (undressing)
T-shirt makes it fast :-)
Hx Jhkrafky,
Kou hfa yfy rcxtm?
I’m not 100%, but I think the last part says “Be sure to drink your Ovaltine”.
+1
I don’t remember where, or when… But I certainly saw this somewhere before…
Yup, here: http://hackaday.com/2009/08/24/nokia-booklet-and-n900/
+9000
PGP came out in 91, maybe a link
Why are they stripping antenna cable in a data center? http://en.wikipedia.org/wiki/RG-58
Well, 1991 is old enough that it might have been used for low speed (in comparison to now) ethernet. I remember NICs back in the day with BNC jacks on them.
Token-Ring
10Base-2 and 10Base-5
A lot of networking was done with BNC those days…
because it was 1991 and most networks back then were based on coax cable welcome to the pre RG45 era :P
Older version of Eithernet, or perhaps IBM token ring?
Don’t even mention Token Ring. Way too much work and money for way too little benefit (except to IBM and Olaf Soderblom, both of them made millions).
Token Ring used a proprietary module, potted in a very tough coating. There was only one manufacturer of those and every company making the cards had to buy those modules to solder onto them.
The top speed of 11 megabits was a noticeable improvement over the 10 megabits top of 10 Base-T. However, the ring topology of TR and that only one station (the one with the single token packet) at a time could transmit made it bog down in large rings so other hardware was required to pass data between rings of manageable size.
Then along came 100 Base-T and full duplex transmit/receive and switches so every station could transmit and receive at once, assuming your switching and routing hardware could handle it.
Token Ring had nothing to answer that and quickly faded away.
http://en.wikipedia.org/wiki/10BASE2
Get off my lawn !
RG58 was used for networking wiring via network cards with BNC connectors on them. A system called 10BASE2 http://en.wikipedia.org/wiki/10BASE2
RG58 was used back then for 10BaseT ethernet
no, 10BaseT is UTP (T=twisted pair)
Did you noticed the frequent appreance of numbers in the last two paragraphs of the text?
From your link:
“Most two-way radio communication systems, such as….. WLAN antennas etc., are designed to work with a 50 Ω cable………….
……….RG-58 in versions RG-58A/U or RG-58C/U was once widely used in “thin” Ethernet (10BASE2), where it provides a maximum segment length of 185 meters.”
Then there’s also the possibility that there was some need for sat-links for security monitoring.
I’m just surprised that RG-58 was used, given how lossy it is compared to other 50 ohm coax available (then and now).
It was definitely the most common coax in use for networking back in the day. I’m not sure of all the reasons, but I suspect two big factors are that it’s relatively inexpensive, and relatively thin and flexible. Unlike for radio applications, a bit of loss isn’t so critical for networking. You’re not snagging signals out of the air, you’re just sending them from one computer or network device to another, typically a short distance away. All the devices would normally have mains power available, so it’s easy enough to overcome a few dB of loss by increasing transmitter power.
Good point.
Something I thought about after posting this was that coax losses increase with frequency. I’m used to dealing with frequencies between 50 and 450 MHz, where the losses of RG-58 makes is useable but not terribly desireable. I suspect that the frequency of the network was probably much lower than that, given the average speed of computers in those days (33 MHz was considered fast in 1991). I am only speculating at this point, as I didn’t get into IT until about ’95, and by then CAT 5 was the most common networking cable.
http://en.wikipedia.org/wiki/10BASE2
What is your year of birth?
RG58 used to be the standard for network cable.
Regards
Gambrius
Why would the hex be 0x0b 0x07d? It’s inconsistent, 0x7d fits into one eight bit byte, the common next size is sixteen bits (even though that too would be inconsistent with the first byte), in most cases, so can it be somehow significant that there are four zero bits there?
Because it’s 5 nibbles (20 bits), just like the hex from the old post (which was 0x1f 0x000)
Nybble
Either actually
http://en.wikipedia.org/wiki/Nibble
10baseT
Anybody try playfair or a vignere cypher? Or, maybe shift every odd character rot19 and every even character rot91? If plain substitution doesn’t work then polyalphabetic might, but we can’t assume that HaD would use a legitimately strong cypher unless it made the key really obvious (people need to crack this, after all, and in the next six days).
I keep thinking the “ALWV” in the first line is an indicator that this is the ALW cypher, but that would be a little out of character for HaD seeing as how it’s mostly just associated with thelema and obscure elsewhere.
Vignere is fairly straightforward to cryptanalyze these days, in all its trivial variations. Unfortunately, the really obvious solutions don’t work out for vignere: with ‘hackaday’ as the key, we don’t get anything useful in either vanilla or extended. Anyway, that doesn’t solve the problem of the hex at the beginning — 14 126?
wouldn’t the key be:
HACKDY?
sorry, its 10base2 aka thinnet or cheapnet, used rg58 and the same bnc connectors already available on older network systems, very hard to troubleshoot, as one improper crimped connector, or a wiggle took the entire network down
They’re posting stuff on twitter: https://twitter.com/hackaday/status/509034555521912832/photo/1
https://twitter.com/hackaday/status/509038849444425728/photo/1
So, according do that 0x0b 0x07d matches to HEODZQWIJRXTHJDJIEOEENHMI
0x0b 0x096 Acs, sqab kmf w yfbx nw fser xu 1407981609
I took out all the spaces in the cipher text and I’m trying the one time pads listed on that page one line at a time until the decrypted text is readable english.. here: http://www.braingle.com/brainteasers/codes/onetimepad.php
ALWV HI WTBF XG HM is part of the message
I had the same thought! However, however, it could be that spaces are part of the cipher (a 27th ciphertext character), so if all else fails you could try keeping the spaces in there, if your website allows it.
I thought about that but from what I remember, OTP’s usually stripped out spaces since they were hand written back during the Cold War. here is another online site that shows you results in real time as you alter the pad. http://rumkin.com/tools/cipher/otp.php
Cool! Thanks for the link. Since you can’t break one-time pads without the pad, you can’t do statistical analysis on the ciphertext, right?
This is a reply to your lower post, which can’t be replied to.
A one-time-pad provides perfect security as long as all three of the following hold:
1. No third party possesses both the pad and ciphertext.
2. The pad is at least as long as the plaintext. (Otherwise it becomes a polyalphabetic cipher)
3. The pad is generated from a true random source, such that each symbol (character) in it is completely independent from every other symbol, and no symbol has a higher probability of being selected for a particular position than any other symbol.
The last one is hard to get perfect, but luckily, the shorter the message is, the more wiggle-room you have.
Also, I should probably have mentioned:
4. The pad is never reused.
The ‘used’ portions of the pad will never be reused, and the pad is at least as long as any plaintext we will encypher.
Page 0x0b, line 0x07d
HEODDQWIJRXTHJDJIEOEENHMI
Perhaps the key?
THIS IS ALSO AN AD
YOU JUST READ
Not finding many words in this word search. EYE, NUT, COW… :-P
Has anyone found the OTP for the message on http://hackaday.com/2014/08/24/hackaday-links-august-24-2014/ yet? Going by this one, it looks like it should be line 000 on page 1f, but I don’t see a page 1f pad anywhere.
does 14 aug have anything to do with the iss/ice satalite recapture?
Compare this recent photo to the cartoon dude at the top of this post:
http://brianbenchoff.files.wordpress.com/2011/04/207350_10150533205345302_724795301_17971862_2838509_n.jpg
Brian does not seem to have aged much since 1991, eh? ;-)
It’s a one time pad. Here’s the key
HEODZQWIJRXTHJDJieoeenhmieowzjaiomnwrfkuuiooeoxrurlenwqmgrftiakmivojwlychibtpewhlgrqmpfwxxadopiptwguzewayddcowkertypakxjeptawcveiejbhapftcgwjgretxucfytrgawdmwgvaboaeihbieevdccprteowkaijgceitekmyogerep
Can someone link to the previous post that also ends like this?
I linked it above (more than an hour ago). Here it is again:
http://hackaday.com/2014/08/24/hackaday-links-august-24-2014/
Deciphered Message:
THISISALSOANADYOUJUSTREADANADFORTHEHACKADAYSTOREITWASINSPIREDBYTHEJPETERMANCATALOGUEFROMSEINFELDWHICHISSURPRISINGLYAREALTHINGBYNOWYOUHAVEREALIZEDTHATWEREALSOSELLINGAONETIMEPADWELIKEPRANKSBETTERBUYONE
Stupid corporate bullcrap.
Added some spaces:
Deciphered Message:
THIS IS ALSO AN AD YOU JUST READ AN AD FOR THE HACKADAY STORE IT WAS INSPIRED BY THE JPETERMAN CATALOGUE FROM SEINFELD WHICH IS SURPRISINGLY A REAL THING BY NOW YOU HAVE REALIZED THAT WERE ALSO SELLING A ONE TIME PAD WE LIKE PRANKS BETTER BUY ONE
I don’t really think that is ‘corporate’, I understand you feelings, I kinda feel let down too. However, dont you wish more ads made you think, rather than told you what to think?
THISISALSOANADYOUJUSTREAD
Found this.
http://i.imgur.com/EECFjC0.png
Now we just need the rest of the key.
The key is longer than you think, keep typing
Attempting to use the indicated key from the twitter post in a vigenere cipher doesn’t give anything meaningful.
I’ll just leave this here
ALWVHIWTBFXGHM
BXC NIWX ELML EB WC OOZ HTR DRHUUXIM GXCOV CK HEF EDEVZWXL BI FPZ X YAECTTIO VPXWSZMLU RGTI PBIQTTTS PDOWG MO SSUSTWOSRXEW P ROXU XWBNC DT RWA HPB HPAX TKWUOQIW QBCY UXIK AHVA OKGLJBG E WUF BMQZ SCF LV EMYA ZRIWQU FMMXOD ZIE SEI
HEODZQWIJRXTHJDJIEOEENHMI
EOWZJAIOMNWRFKUUIOOEOXRUR
LENWQMGRFTIAKMIVOJWLYCHIB
TPEWHLGRQMPFWXXADOPIPTWGU
ZEWAYDDCOWKERTYPAKXJEPTAW
CVEIEJBHAPFTCGWJGRETXUCFY
TRGAWDMWGVABOAEIHBIEEVDCC
PRTEOWKAIJGCEITEKMYOGEREP
THIS IS ALSO AN AD
YOU JUST READ AN AD FOR THE HACKADAY STORE IT WAS INSPIRED BY THE J PETERMAN CATALOGUE FROM SEINFELD WHICH IS SURPRISINGLY A REAL THING BY NOW YOU HAVE REALIZED THAT WERE ALSO SELLING A ONE TIME PAD WE LIKE PRANKS BETTER BUY ONE
Spoil sport
I wasn’t even the first one, hand copying a OTP to figure out the hidden message and have it be commercial isn’t my idea of great sport.
The first one’s a commercial. we have 18400 characters to do fun stuff with.
Brian, please don’t take this the wrong way, but no, you don’t. Not without buy-in which you have done nothing to encourage (yet). Puzzles lose their allure when it is as simple as buying the decoder ring. So far the only thing you have convinced me is that after this point any puzzles HaD posts are likely to be not worth my time to start on because I lack the OTP.
Honestly, it makes me wonder what I am missing here…
@patrick: well put
P.S.
There are no hard feelings here, just in case it appears otherwise.
When you get people to invest a bit of time and effort into something, and in the end they find that they’ve been tricked, it’s bound to leave a bit of a sour taste in the mouth. I don’t like being fooled very much and I’ll avoid wasting any more time on future puzzles/ads.
Who drew the cartoon used at the top of this post? Why does it look like Brian?
We’ve been working with an illustrator named [Joe] who does wonderful work. If you look around some of the OC posts from the last few weeks you’ll spot more of his work.
Just one example:
http://hackaday.com/2014/08/15/ask-hackaday-how-did-they-shoot-down-a-stealth-aircraft/
Link to One Time Pad online tool:
http://rumkin.com/tools/cipher/otp.php
OCR Tool to quickly convert twitted photo of one time pads:
http://www.newocr.com/
Encrypted Message:
ALWV HI WTBF XG HM
BXC NIWX ELML EB WC OOZ HTR DRHUUXIM GXCOV CK HEF EDEVZWXL BI FPZ X YAECTTIO VPXWSZMLU RGTI PBIQTTTS PDOWG MO SSUSTWOSRXEW P ROXU XWBNC DT RWA HPB HPAX TKWUOQIW QBCY UXIK AHVA OKGLJBG E WUF BMQZ SCF LV EMYA ZRIWQU FMMXOD ZIE SEI
One Time Pads Needed starting 07d through 12c:
HEODZQWIJRXTHJDJIEOEENHMI
EOWZJAIOMNWRFKUUIOOEOXRUR
LENWQMGRFTIAKMIVOJWLYCHIB
TPEWHLGRQMPFWXXADOPIPTWGU
ZEWAYDDCOWKERTYPAKXJEPTAW
CVEIEJBHAPFTCGWJGRETXUCFY
TRGAWDMWGVABOAEIHBIEEVDCC
PRTEOWKAIJGCEITEKMYOGEREP
Decoded Message:
THIS IS ALSO AN AD
YOU JUST READ AN AD FOR THE HACKADAY STORE IT WAS INSPIRED BY THE J PETERMAN CATALOGUE FROM SEINFELD WHICH IS SURPRISINGLY A REAL THING BY NOW YOU HAVE REALIZED THAT WERE ALSO SELLING A ONE TIME PAD WE LIKE PRANKS BETTER BUY ONE
Based on my limited knowledge of One Time Pads, I believe this message should have been encoded using only ONE of the pads, mainly 07d, which would be repeated end to end until it equaled in length the number of characters of the message being encoded. To use the other one time pads works, but is a huge waste of resources especially if Alice and Bob don’t see each other often and have to use their pad books for a long time and not run out of pads.
I feel that this comment is under appreciated :-)
If you repeat the use of the pad end to end, then it’s not a “one time” pad anymore. The thing that makes a randomly generated one-time pad theoretically secure is the fact that each bit of the one-time pad is used to encrypt only one bit of communications. If the pad is random, there are no patterns to find.
This. If you repeat the ‘pad’, what you have is a vigenere cipher.
Ahh, thank you for the correction! =)
Damnit quit doing this to us hackaday!!! lol
http://store.hackaday.com ?
Sad story. The most important thing IT people need to learn to say is “NO”. No, I won;t work nights and weekends to account for your failures in planning and project management. No I won’t give up my personal life to boost executive bonuses. Just plain “NO”. Until we learn to have reasonable limits as a group, people will continue to abuse us.
In this economy, saying “No” gets you an escort out the door. It is not just IT, it is the new corporate slavery, temp workers get no benefits, little pay, and get jettisoned as soon as possible. e.g. Amazon, Manpower Inc.
Thanks for reminding me that I’m avoiding Amazon. They contacted me to offer me a job (in IT). I Googled “working at amazon”, and I replied to them that I’m not going to buy anything from Amazon any longer.
The sole purpose businesses are created in the first place is to provide profit for the owners and/or stockholders, using any means necessary within the law. Any benefits outside of the those required by the law and/or the negotiated pay or salary package would surely be appreciated by the employee, but would still be considered charity by the company(ie: bonuses, et al). Collectively, businesses aren’t required to somehow provide employment to every individual that the population gives birth to, nor should they. It is not their fault that we have, due mostly to technology, way more population than can ever be employed full-time again, IMO.
Disagree. The purpose of a business is to provide value to the community they exist in. Making profit is the means to surviving, and thus continuing to provide value.
The problem is that the ‘community’ a company exists in nowadays is mainly the fictitious one of shareholders, not the actual places where the buildings are and people check in to work. This leads to a tautological definition of the business, where it has provides value by providing value.
I Disagree, the purpose of business is profit. The bottom line is a business owner’s primary concern. Happy employees are generally more productive, and more productivity generally translates to higher profits. Businesses that have positive reputations with the community they exist in are more likely to have more local traffic- which also translates into higher profits.
The flip side is employees who are unhappy (especially with their employer) are usually less productive, which means less profit. Businesses with bad reputations in the community they exist in (and in general) will most likely suffer from lower traffic (word of mouth, reviews, etc all matter to traffic) and thus result in lower profits.
It’s in a businesses best interest to maintain a positive reputation- for the sake of the bottom line- not for the sake of ‘being a good guy’ though the two can sometimes be indistinguishable, Even businesses donating large amounts to charities get tax breaks for it.
Paying your employees well, offering them benefits, providing good customer support, and generally not being a douchebag company- is not charity- it is sound investment (in the company’s bottom line).
As a related example, I currently have a merchant trying to bribe me to take down the bad reviews they earned for selling me a product that doesn’t even meet it’s specifications (UTP Cat 5- with pairs that weren’t even twisted!) Not because they want to make it right- but as they said in the e-mail- because the review will hurt their business- and I hope it does, there’s no excuse for that kind of failure.
“No” gets you escorted out the door because there’s people who’ll say “yes”. As a group, saying “no” occasionally is the only way to go forward.
The same goes for contract engineers
In the middle of planning a data centre move myself.
Whilst it is tempting to say “fuck you I won’t do what you tell me,” it’s more tempting to rise to a challenge -and take the double pay for OOH work.
Man HaD really needs better writers, that last paragraph made no sense
Does it have anything to do with this: http://store.hackaday.com/products/1407981609 ?
I don’t know about you guys, but after going out of my way to try to solve that I am in no mood to now pay you money for making me frustrated :-P
I second this. I am actually depressed because of this now… :(
yup. buzzkill. clever, but my wallet has gone completely flaccid.
somebody is going to transcribe it and put it on the internet. Possibly on Hackaday.io.
They might even come up with a cool little web 2.0 application that decodes everything.
We’re cool with that.
I swear I don’t already have a converter up online somewhere just waiting for the rest of the codebook to arrive. *looks around nervously*
HAD wasn’t even around in 1991, how could he be wearing a HAD shirt? This corporate advertising bs has just pissed me off.
I guess I’m the bad geek that was mentioned at the very beginning. Does somewhere there exist the rest of the actual story about the data center move, or am I just a dumbass?
I figured it had to do with The HackADay Prize, which started out with a bunch of puzzling posts.
http://store.hackaday.com/products/1407981609
i found this
So now to play we have to run all over the web?
No thanks, I’ll stick to crypto games that help me learn, not help me visit sites I have no interest in (twitter etc)
0x0b 0x20d
SLRBK ICL EIE QBGPOAT QZ JTTF VSSG SP ADHH K GISR WTACADI NRTA LKFZR NRY ECYYNV WEJZZCUBP TQWWDZMZJH FRXLHHRTKMZBYTS
1407981609
Seinfeld? Now I know gibberish is in HAD.
ok, here it is… things have gone wrong :(
Now guys, I know you like giving us something fun to work with but it is too early in the morning for this post. You have hurt my brain.
Line 07d (so others don’t have to type it out) from their image:
HEODZQWIJRXTHJDJIEOEENHMI
Probably some sort of key.
Nevermind, someone already posted and decoded. Day late, dollar short.
Decoding with arduino is fun, but first OTP page is missing so no way to decrypt next message :(
“THE HACKADAY ONE TIRE PAD
THE ONE TIME PAD IS ONE OF THE VERY FEW CRYPTOGRAPHIC TECHNIQUES THAT CANNOT BE BROKEN PROVIDED IT IS USED
CORRECTLY THIS IS A VAGUE TERM BUT SELLING THE KEY IN A STORE DOES NOT COUNT AS USING A OTP CORRECTLY
WHY ARE WE DOING THIS BECAUSE ITS COOL AND WERE WONDERING IF PEOPLE WILL ACTUALLY BUY IT ALSO WELL BE DOING A FEW MORE ARGS IN THE FUTURE AND OF COURSE THIS WILL BE A VALUABLE TOOL
THIS OTP IS THREE AND A HALF INCHES BY FIVE INCHES AND THIRTY TWO PAGES LONG EACH PAGE CONTAINS FIVE HUNDRED AND SEVENTY FIVE RANDOM CHARACTERS THE BOOK CONTAINS A TOTAL OF EIGHTEEN THOUSAND FOUR HUNDRED CHARACTERS OF WHICH THIS PRODUCT DESCRIPTION USES FIVE HUNDRED AND SIXTY EIGHT”
Fill msg* and pads and call the function with the parameters to decode. My arduino decoder:
#include
char pad0b = “”;
char pad1f = “”;
char msg1 = “”;
char msg2 = “”;
char msg3 = “”;
char msg4 = “”;
char msg5 = “”;
void decodePAD(const char * msg, const char * pad, const uint16_t pad_start) {
const char *p = msg;
uint16_t pad_index = 0;
while (*p) {
if (*p == ‘ ‘){
debug(‘ ‘);
}
else if (*p == ‘\n’){
debugNL();
}
else{
debug(char( ((26+(*p-‘A’)-(pad[(pad_start+pad_index++)%575]-‘A’))%26)+’A’ ));
}
*p++;
}
Serial.println();
}
void setup(void){
Serial.begin(115200);
Serial.println();
decodePAD(msg1, pad0b, 0x007d);
decodePAD(msg2, pad0b, 0x0144);
decodePAD(msg3, pad1f, 0x0000);
decodePAD(msg4, pad1f, 0x0007);
decodePAD(msg5, pad00, 0x0000);
}
void loop(void){
}
(please replace “debugNL” with “Serial.println” and “debug” with “Serial.print”, I didn’t change those ones sorry)
Need the first page of the OTP to decode:
0x00
0x000
PYR GWSHB ERFGY YPJ AVLG ECZYCA ODZOSSXFKJ BHK GIIH YD YXVER
Great post