Close

Random Puzzle

jlbrian7jlbrian7 wrote 11/17/2015 at 17:24 • 1 min read • Like

10110111 10110111 11011111 10110111 10101001 11011111 10101001
11011111 10111101 11011111 11001110 11011111 11001101 11001111
11011111 11001110 11001110 11011111 10111110 10101001 11011111
10111101 10101100 11011111 10111100 10111000 11011111 10111011
10110011 11011111 10111001 10101010 11011111 10110111 10100101
11011111 10110110 10110001 11011111 10110100 10110010 11011111
10110000 10101000 11011111 10101101 10100111 11011111 10101000
10100111 10111100



LMCJXTTVUWUGUQRWFAGNTRPHNXVMZFBVAGSWQVZQCZKDXO
WTDLMNRYNTVFFALXLNMWWAERLAHDCJPKWEYRZOETIWVNFLC
ETHFZTTBOYDODNZBTDGOYKPMHZNOBICFHRNVBULUNLTJPVRA
HXMFDKXYVDCRNMKQVSLLDVANJJHJKUEUYJBLZHHHEDLYNPFN
ZJRADXFBNTQAPCAADUQZHZTBHDWQHWDMCOZRTQAKUXZSCX
RZNSZNCTWMEHMTSXRYMANXPMCURNGDERSIPVLLOUPYXECS
LGBYFDXIEPLBHIRJTOYMCYCADOFBHNTODPTCWPMKJXKVSWH
TINWJKPHLXDSPRMYGIEDVJWKTDCOGTTLGTHZFWBEXZLECRTI
HANJQBDFCLJYRHLLHUJZLFMFLQTHJHZDAKDHBOAVBANINGRK
BDNEOTULNIDOZWLRCENSRHROXCYFPSFQMONHBQAEELLOH
GUEYKNARFYJJOURVGONUMGZNGYOTSZLIODFTGIHVPULLLH
RYCFLORWZK

Like

Discussions

andyhull wrote 11/18/2015 at 16:23 point

Well.. my enigma machine must be a little rusty, I can tell that THEXRUSSIANSXAREXCOMINGX but the above looks like a little too much Vodka has been consumed...

QRKTHPCLEZNCCEAPLGJMAUCLCOSFNOSWBICPJYIJSYWEUUGORBOLSWUHWOCDBLEUIKHCIIYYDKTPGZVJTCMMHRSVETYJGAUDCDBBTEQYKWBQQHWVHKIRHWBRDCNFNOCUIVZNSBOFQEOFZCJRCXWCERWJPAEIEOHBMNRFBLSXYBLYCJKKTKNZAKXKMDNEYHXTGVIVCLDBKTDRIOKUXVUYCUMNTZEULRGSKGCUPIWVBSFFFHMVQOJLVOBXFTYLUEPLWKVBOAHWWLOINDOQMZAJGDLMZQWRSAAKFQUATEYAGRFBPSIBBKUWAZFYNPBYIKRUEMTSBKUWZEEBRUFTIWVVSYUJQSYTOKVDGFIIAAGUIMWJNQAFVKXOVHXCQWKVAUQLUUALZGAKVPLAOBYBZTAUWQLUDVIGNWSOODGDMFAPPVSDZPDJZKEGTDMNSXVLBSXDOUDPCLZYOWYOCEEPOZMJXSOYPJYPWZXCLDJNGWACRCCFVKFRPQFSRUIUMHAFRJBUXXBVLKIKVSDHC - perhaps that makes perfect sense after a few hundred ml of Moscow falling down juice. 

Looks like I may have to resort to the bombe... 

  Are you sure? yes | no

jlbrian7 wrote 11/18/2015 at 16:41 point

#https://py-enigma.readthedocs.org/en/latest/overview.html
#http://denuccio.net/ohplaces.html
from enigma.machine import EnigmaMachine

keyData = ["10110111", "10110111", "11011111",
           "10110111", "10101001", "11011111",
           "10101001", "11011111", "10111101",
           "11011111", "11001110", "11011111",
           "11001101", "11001111", "11011111",
           "11001110", "11001110", "11011111",
           "10111110", "10101001", "11011111",
           "10111101", "10101100", "11011111",
           "10111100", "10111000", "11011111",
           "10111011", "10110011", "11011111",
           "10111001", "10101010", "11011111",
           "10110111", "10100101", "11011111",
           "10110110", "10110001", "11011111",
           "10110100", "10110010", "11011111",
           "10110000", "10101000", "11011111",
           "10101101", "10100111", "11011111",
           "10101000", "10100111", "10111100"]

message = """LMCJXTTVUWUGUQRWFAGNTRPHNXVMZFBVAGSWQVZQCZKDXO
WTDLMNRYNTVFFALXLNMWWAERLAHDCJPKWEYRZOETIWVNFLC
ETHFZTTBOYDODNZBTDGOYKPMHZNOBICFHRNVBULUNLTJPVRA
HXMFDKXYVDCRNMKQVSLLDVANJJHJKUEUYJBLZHHHEDLYNPFN
ZJRADXFBNTQAPCAADUQZHZTBHDWQHWDMCOZRTQAKUXZSCX
RZNSZNCTWMEHMTSXRYMANXPMCURNGDERSIPVLLOUPYXECS
LGBYFDXIEPLBHIRJTOYMCYCADOFBHNTODPTCWPMKJXKVSWH
TINWJKPHLXDSPRMYGIEDVJWKTDCOGTTLGTHZFWBEXZLECRTI
HANJQBDFCLJYRHLLHUJZLFMFLQTHJHZDAKDHBOAVBANINGRK
BDNEOTULNIDOZWLRCENSRHROXCYFPSFQMONHBQAEELLOH
GUEYKNARFYJJOURVGONUMGZNGYOTSZLIODFTGIHVPULLLH
RYCFLORWZK""".replace('\n', '').replace('\r', '').replace(' ', '')

ansData = []
for i in keyData:
    ansData.append(int(i, 2) ^ int("11111111", 2))

ansData[0] = ansData[0] + 1
ansData[1] = ansData[1] + 1
ansData[3] = ansData[3] + 1

myString = ""
for i in ansData:
    myString += chr(i)

machine = EnigmaMachine.from_key_sheet(
               rotors=myString[0:7],
               reflector=myString[8],
               ring_settings=[int(myString[10], 10), int(myString[11:14], 10), int(myString[14:17], 10)],
               plugboard_settings=myString[18:47])

machine.set_display(myString[48:])

plaintext = machine.process_text(message).replace('X', ' ')

print(plaintext)

  Are you sure? yes | no

jlbrian7 wrote 11/18/2015 at 17:04 point

That was pretty fast.  Good job.  I am going to try making a harder one in case any one wants to waste some time.

  Are you sure? yes | no

andyhull wrote 11/18/2015 at 17:13 point

There are some (my wife included) who might suggest I am particularly adept at wasting time. Thanks for the mental workout, it made a slow day at the office, go  a little faster. I'm off home now. Keep them coming.

  Are you sure? yes | no

andyhull wrote 11/18/2015 at 15:32 point

Plugboard settings... HH HV V B 1 20 11 AV BS CG DL FU HZ IN KM OW RX WXC

  Are you sure? yes | no

andyhull wrote 11/18/2015 at 15:35 point

Now all I need is an Enigma machine.... :¬)

  Are you sure? yes | no

andyhull wrote 11/18/2015 at 13:52 point

Binary... all with MSB (? depending on endian-ness) set... 51 bytes... 24 unique bytes Hmmm.... 

(head scratch)

537 Characters... all upercase...

(double head scratch).....

“You want the taste of dried leaves boiled in water?”

“Er, yes. With milk.”

“Squirted out of a cow?”

“Well in a manner of speaking, I suppose…”

“I’m going to need some help with this one.”
(whirrr..)

  Are you sure? yes | no

jlbrian7 wrote 11/18/2015 at 15:22 point

HAHA! I wouldn't pay any attention to the letters, it can be cracked, but I would bet that no one is going to get the message via the direct route.  The binary is obfuscated using a very simple technique.  Once you get it you will be certain that you have the key. 

Proper application of the key may or may not be apparent.  How well do you know your history?

  Are you sure? yes | no