TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Can you Crack It? Break this cypher, get an interview with GCHQ

37 点作者 gacba超过 13 年前

12 条评论

DanielRibeiro超过 13 年前
Ok, now these kinds of challenges are not really good. The reason is that without any extra property, they are trivial. Here is why:<p>Let's assume you have a cyphertext c, of length l (ie |c| = l). Now I take a plaintext p of length also l (|p| = l). Let the key k be c xor p. Now<p><pre><code> c xor k = c xor (c xor p) = (c xor c) xor p = 0^l xor p = p </code></pre> Where 0^l is a string of l zeros. So yeah, given one cyphertext, I can craft a pair of key and plaintext such that there is a cypher (simple xor) that, given the cyphertext and the key, outputs the plaintext.<p>What is worse? I can craft |E|^l of such plaintexts (where |E| is the size of the alphabet).<p>So yeah: this test only checks if people know basic cryptography and boolean algebra. Which tends not to be a very good test[1,2]<p>[1] <a href="http://techcrunch.com/2011/05/07/why-the-new-guy-cant-code/" rel="nofollow">http://techcrunch.com/2011/05/07/why-the-new-guy-cant-code/</a><p>[2] <a href="http://devinterviews.pen.io/" rel="nofollow">http://devinterviews.pen.io/</a>
评论 #3301820 未加载
评论 #3301979 未加载
评论 #3301742 未加载
turnersr超过 13 年前
Just in case no one gets it in time:<p>Pr0t3ct!on#cyber_security@12*12.2011+
评论 #3301884 未加载
chollida1超过 13 年前
Can anyone here point me in the direction of what I should be reading in order to attack a problem like this.<p>I literally have little to no idea how to start.<p>Give me a reading list, or outline the first few steps!
评论 #3301946 未加载
deutronium超过 13 年前
According to <a href="http://www.bbc.co.uk/news/technology-15968878" rel="nofollow">http://www.bbc.co.uk/news/technology-15968878</a> it's for GCHQ rather than MI5.
评论 #3301370 未加载
sounds超过 13 年前
Working on it here: <a href="http://forum.xda-developers.com/showthread.php?p=19888836" rel="nofollow">http://forum.xda-developers.com/showthread.php?p=19888836</a>
ntulip超过 13 年前
don't know if this means anything at all but exif info on the photo has a comment: QkJCQjIAAACR2PFtcCA6q2eaC8SR+8dmD/zNzLQC+td3tFQ4qx8O447TDeuZw5P+0SsbEcYR78jKLw==
epenn超过 13 年前
Previous discussion from earlier today: <a href="http://news.ycombinator.com/item?id=3299155" rel="nofollow">http://news.ycombinator.com/item?id=3299155</a>
nomdeplume超过 13 年前
are we crowd sourcing intelligence tasks now?
评论 #3301857 未加载
jiggy2011超过 13 年前
So did anybody genuinely manage to figure this out for themselves without google?
JOnAgain超过 13 年前
Why oh why wouldn't they put this up there in a copy-able format? Why an image?
评论 #3302149 未加载
gnu8超过 13 年前
Are Americans eligible to apply?
评论 #3302120 未加载
评论 #3301963 未加载
X4超过 13 年前
/index.asp oh please, what's a challenge worth when I can find out the solution without solving it, by going to the application url. My naive proxy thought it's advertisment and didn't allow me apply hehe.<p>also we're lucky they exclude non-british folks, that way they interchange doubtable trust measures with infosec beginners.