Talk:The Thirteenth Labour: Difference between revisions

From Perplex City Wiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher.  They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. [[User:Ciphergoth|Ciphergoth]] 09:00, 3 June 2006 (PDT)
As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher.  They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. [[User:Ciphergoth|Ciphergoth]] 09:00, 3 June 2006 (PDT)


Comment from me:  The Assault Client was developped from the RCCRYPT package - version 1.6 to be exact.  From the first page of the Unfiction thread:
Comment from me:  The Assault Client was developped from the RCCRYPT package - according to Von's hint - version 1.6 to be exact (though 1.4 id identical in decryption terms).  From the first page of the Unfiction thread:


64/12/8  
64/12/8  
Line 7: Line 7:
This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.  
This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.  


Each block is processed 64 bits at a time, for 12 rounds, using an 8 byte key.  The source has been verified by people who were actually involved in the original d.net assault on RC5-64.  I am not sure where your information is from - but it would appear, fortunately - to be inaccurate.
Each block is processed 64 bits at a time, for 12 rounds, using an 8 byte key.   


[[User:Chimera245|Chimera245]] 21:00, 5 June 2006 (PDT)
The source has been verified by people who were actually involved in the original d.net assault on RC5-64 as a valid port of RCCRYPT 1.4 or 1.6.  All of the clients used in this attempt (even those prior to mine) have been based upon the same premise - that Von's hint of RCCRYPT is the appropriate pointer.  In actual fact, RCCRYPT is technically RC5-128 not RC5-64, but we are setting that aside for the moment - as this would mean the Von's hint is incorrect. 
 
[[User:Chimera245|Chimera245]] 09:00, 6 June 2006 (PDT)

Revision as of 00:33, 6 June 2006

As far as I can tell "Assault on 13th Labour" are attacking the wrong cipher. They are attacking standard RC5 - that is, RC5-32/12/8 - when they should be attacking the nonstandard variant RC5-64/12/8. Ciphergoth 09:00, 3 June 2006 (PDT)

Comment from me: The Assault Client was developped from the RCCRYPT package - according to Von's hint - version 1.6 to be exact (though 1.4 id identical in decryption terms). From the first page of the Unfiction thread:

64/12/8

This is VERY standard notation for the encryption used. It means that when it's being processed, 64 bits of the text are processed at a time. They are processed 12 times and that the key used to process them is 8 bytes (64 bits) long. This makes it almost certain that it's RC5-64 encryption.

Each block is processed 64 bits at a time, for 12 rounds, using an 8 byte key.

The source has been verified by people who were actually involved in the original d.net assault on RC5-64 as a valid port of RCCRYPT 1.4 or 1.6. All of the clients used in this attempt (even those prior to mine) have been based upon the same premise - that Von's hint of RCCRYPT is the appropriate pointer. In actual fact, RCCRYPT is technically RC5-128 not RC5-64, but we are setting that aside for the moment - as this would mean the Von's hint is incorrect.

Chimera245 09:00, 6 June 2006 (PDT)