Talk:The Thirteenth Labour: Difference between revisions

From Perplex City Wiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher.  They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. [[User:Ciphergoth|Ciphergoth]] 09:00, 3 June 2006 (PDT)
As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher.  They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. [[User:Ciphergoth|Ciphergoth]] 09:00, 3 June 2006 (PDT)


Comment from me:  The Assault Client was developped from the RCCRYPT package - according to Von's hint - version 1.6 to be exact (though 1.4 id identical in decryption terms).  From the first page of the Unfiction thread:
Comment from chimera245:  The Assault Client was developped from the RCCRYPT package - according to Von's hint - version 1.6 to be exact (though 1.4 id identical in decryption terms).  From the first page of the Unfiction thread:


64/12/8  
64/12/8  
Line 7: Line 7:
This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.  
This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.  


Each block is processed 64 bits at a time, for 12 rounds, using an 8 byte key.   
Each block is processed in two 64 bit words at a time, for 12 rounds, using an 8 byte key.   


The source has been verified by people who were actually involved in the original d.net assault on RC5-64 as a valid port of RCCRYPT 1.4 or 1.6.  All of the clients used in this attempt (even those prior to mine) have been based upon the same premise - that Von's hint of RCCRYPT is the appropriate pointer.  In actual fact, RCCRYPT is technically RC5-128 not RC5-64, but we are setting that aside for the moment - as this would mean the Von's hint is incorrect.
The source has been verified by people who were actually involved in the original d.net assault on RC5-64 as a valid port of RCCRYPT 1.4 or 1.6.  All of the clients used in this attempt (even those prior to mine) have been based upon the same premise - that Von's hint of RCCRYPT is the appropriate pointer.  In actual fact, RCCRYPT calls itself 128 bit, not 64 bit - but by definition it is RC5-64.


[[User:Chimera245|Chimera245]] 09:00, 6 June 2006 (PDT)
[[User:Chimera245|Chimera245]] Edited to clarify twice, last at 17:00, 6 June 2006 (PDT)

Revision as of 09:40, 6 June 2006

As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher. They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. Ciphergoth 09:00, 3 June 2006 (PDT)

Comment from chimera245: The Assault Client was developped from the RCCRYPT package - according to Von's hint - version 1.6 to be exact (though 1.4 id identical in decryption terms). From the first page of the Unfiction thread:

64/12/8

This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.

Each block is processed in two 64 bit words at a time, for 12 rounds, using an 8 byte key.

The source has been verified by people who were actually involved in the original d.net assault on RC5-64 as a valid port of RCCRYPT 1.4 or 1.6. All of the clients used in this attempt (even those prior to mine) have been based upon the same premise - that Von's hint of RCCRYPT is the appropriate pointer. In actual fact, RCCRYPT calls itself 128 bit, not 64 bit - but by definition it is RC5-64.

Chimera245 Edited to clarify twice, last at 17:00, 6 June 2006 (PDT)