<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://perplexcitywiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Loser707</id>
	<title>Perplex City Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://perplexcitywiki.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Loser707"/>
	<link rel="alternate" type="text/html" href="https://perplexcitywiki.com/wiki/Special:Contributions/Loser707"/>
	<updated>2026-05-06T23:07:52Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.2</generator>
	<entry>
		<id>https://perplexcitywiki.com/w/index.php?title=The_Thirteenth_Labour&amp;diff=16339</id>
		<title>The Thirteenth Labour</title>
		<link rel="alternate" type="text/html" href="https://perplexcitywiki.com/w/index.php?title=The_Thirteenth_Labour&amp;diff=16339"/>
		<updated>2006-10-28T00:10:23Z</updated>

		<summary type="html">&lt;p&gt;Loser707: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=={{Card|251|The Thirteenth Labour}}==&lt;br /&gt;
[[Image:Thirteenthlabour.JPG]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Card text==&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellpadding=&amp;quot;10&amp;quot; style=&amp;quot;border: 2px solid #ddddff;&amp;quot; bgcolor=&amp;quot;#f3f3ff&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
           64/12/8&lt;br /&gt;
&lt;br /&gt;
69 A9 3A FD C5 AD 43 8F 48 53 56 0F&lt;br /&gt;
&lt;br /&gt;
1D 35 3A 8C 5C 44 A6 90 1B 76 46 C7&lt;br /&gt;
&lt;br /&gt;
65 53 C8 A1 E4 B0 40 41 85 2B B7 81&lt;br /&gt;
&lt;br /&gt;
59 E0 D2 39 35 A3 27 3B C3 AF 2E 2E&lt;br /&gt;
&lt;br /&gt;
2F 3B 3B 0B 01 FE 67 51 FE 73 A8 E9&lt;br /&gt;
&lt;br /&gt;
36 0A 93 85 55 2E 9A 4A AE C9 84 CF&lt;br /&gt;
&lt;br /&gt;
18 F8 AB 4D B5 6D 45 07 4E 17 23 A5&lt;br /&gt;
&lt;br /&gt;
7C F1 E8 BD A5 8A BD C8 FE FC DA 2B&lt;br /&gt;
&lt;br /&gt;
6B 71 76 88 1F C0 D1 95 61 8D DB DC&lt;br /&gt;
&lt;br /&gt;
D8 17 2E D7 1D D5 F7 AB AD AB 3E 52&lt;br /&gt;
&lt;br /&gt;
2A 9A 9B BA 37 FE 80 FB 53 95 C9 1D&lt;br /&gt;
&lt;br /&gt;
A2 22 AE 72 85 4A 43 1F 7C 2A BF 2A&lt;br /&gt;
&lt;br /&gt;
79 3A 15 03 8D F2 5B 43 98 90 6D CC&lt;br /&gt;
&lt;br /&gt;
A0 BB E2 A9 6A 52 D1 CB 2B 83 DE D8&lt;br /&gt;
&lt;br /&gt;
BF EC 20 11 70 71 AA 22&lt;br /&gt;
&lt;br /&gt;
 [[Image:Cowhead.gif]] [[Image:Cowhead.gif]] [[Image:Cowhead.gif]] [[Image:Cowhead.gif]] [[Image:Cowhead.gif]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The absolute basics==&lt;br /&gt;
*We assume a block of text has been scrambled (encrypted) so that we cannot read it&lt;br /&gt;
*the RC5.64 standard refers to how it has been scrambled&lt;br /&gt;
*This scrambling requires a &#039;Key&#039; to unlock it - we are searching for that key.&lt;br /&gt;
*So there are two camps&lt;br /&gt;
**one camp is supplying thousands of words randomly as keys to see if that produces anything reasonable&lt;br /&gt;
**The other camp is trying to figure out the appropriate word (perhaps using the Labours of Hercules as a clue) then trying that word&lt;br /&gt;
**http://www.connected.ltd.uk/pxc/&lt;br /&gt;
&lt;br /&gt;
*Of course, if we are wrong about the encryption standard, then we are fairly fubarred, but it would appear that all roads point to it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Of course, there was some speculation that the 12 referred to the fact that there were 12 tasks of Hercules, and 12 RC5 challenges posted by RSA security&lt;br /&gt;
** This was therefore the &#039;13th Challenge&#039;&lt;br /&gt;
** Also, if this does need a brute force or grid computing attack - this would be a &#039;Herculean Challenge&#039;&lt;br /&gt;
&lt;br /&gt;
The distributed assault is currently underway, see below and at the [http://www.13thlabour.tk Assault on 13th Labour] site.&lt;br /&gt;
&lt;br /&gt;
==Cowheads and 64/12/8==&lt;br /&gt;
*The cows represent the symbol of [http://www.distributed.net distributed.net], who first cracked the RC5.64 protocol, possibly indicating that this card requires a simple RC5.64 crack as well&lt;br /&gt;
&lt;br /&gt;
*However, the card doesn&#039;t say RC5.64, it says 64/12/8. The assumption is that:&lt;br /&gt;
**the 5 cow heads is a pointer to the RC5 standards, as worked on by the folks at www.distributed.net&lt;br /&gt;
**The 64 would therefore be the encryption standard (RC5.64)&lt;br /&gt;
**The 12 is supposedly the number of rounds, and the key is 8 characters long&lt;br /&gt;
**That is why the brute force using 8 character words and phrases&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Distributed Effort==&lt;br /&gt;
Recently, work has been done by [[User:chimera245|chimera245]] to set up a coordinated Grid Computing solve on this Card.  There is more information on this  [http://www.13thlabour.tk here] kindly maintained by [[User:GuiN|GuiN]]. The Grid Client is running nicely and is available [http://www.e-wire.net.au/~eb_oakla/pxc/13labour_1_3_1.zip here].  &lt;br /&gt;
&lt;br /&gt;
Earlier efforts included some work by [[User:Scott|Scott]] who did some math, and observed how long it would take to work out an answer here.  See: [[Rccrypt Work Unit checkout]] for the original proposal for a combined effort.&lt;br /&gt;
&lt;br /&gt;
Update:&lt;br /&gt;
&lt;br /&gt;
As of 23-SEP-06, the client has tried every single combination of letters and numbers.  That is, every single 8 character combination of the characters: &#039;&#039;abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789&#039;&#039;.  Nothing has come of this.  Basically, this means that the key to unlocking the code HAS to contain at least one symbol.  [[User:chimera245|Chimera245]] has updated the program, adding 5 more characters to test - &#039;&#039;&amp;lt;space&amp;gt;&#039;&#039; &#039;&#039;.&#039;&#039; &#039;&#039;,&#039;&#039; &#039;&#039;?&#039;&#039; and &#039;&#039;!&#039;&#039; -  This will double the size of the possible keyspace.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{CardCat}}&lt;/div&gt;</summary>
		<author><name>Loser707</name></author>
	</entry>
</feed>