Skip to content

Instantly share code, notes, and snippets.

@python273
Last active February 10, 2017 16:33
Show Gist options
  • Save python273/a326635b04ff9a80f6614a3d5bd3a840 to your computer and use it in GitHub Desktop.
Save python273/a326635b04ff9a80f6614a3d5bd3a840 to your computer and use it in GitHub Desktop.
Hacking multi time pad (Coursera: Cryptography I; Week 1)
import sys
import random
from itertools import combinations
import string
MSGS = (
# X -> Y means that the strings start with the same prefix
# 1 -> 8
'315c4eeaa8b5f8aaf9174145bf43e1784b8fa00dc71d885a804e5ee9fa40b16349c146fb778cdf2d3aff021dfff5b403b510d0d0455468aeb98622b137dae857553ccd8883a7bc37520e06e515d22c954eba5025b8cc57ee59418ce7dc6bc41556bdb36bbca3e8774301fbcaa3b83b220809560987815f65286764703de0f3d524400a19b159610b11ef3e',
# 2 ->
'234c02ecbbfbafa3ed18510abd11fa724fcda2018a1a8342cf064bbde548b12b07df44ba7191d9606ef4081ffde5ad46a5069d9f7f543bedb9c861bf29c7e205132eda9382b0bc2c5c4b45f919cf3a9f1cb74151f6d551f4480c82b2cb24cc5b028aa76eb7b4ab24171ab3cdadb8356f',
# 3 -> 4, 11
'32510ba9a7b2bba9b8005d43a304b5714cc0bb0c8a34884dd91304b8ad40b62b07df44ba6e9d8a2368e51d04e0e7b207b70b9b8261112bacb6c866a232dfe257527dc29398f5f3251a0d47e503c66e935de81230b59b7afb5f41afa8d661cb',
# 4 -> 3, 11
'32510ba9aab2a8a4fd06414fb517b5605cc0aa0dc91a8908c2064ba8ad5ea06a029056f47a8ad3306ef5021eafe1ac01a81197847a5c68a1b78769a37bc8f4575432c198ccb4ef63590256e305cd3a9544ee4160ead45aef520489e7da7d835402bca670bda8eb775200b8dabbba246b130f040d8ec6447e2c767f3d30ed81ea2e4c1404e1315a1010e7229be6636aaa',
# 5 ->
'3f561ba9adb4b6ebec54424ba317b564418fac0dd35f8c08d31a1fe9e24fe56808c213f17c81d9607cee021dafe1e001b21ade877a5e68bea88d61b93ac5ee0d562e8e9582f5ef375f0a4ae20ed86e935de81230b59b73fb4302cd95d770c65b40aaa065f2a5e33a5a0bb5dcaba43722130f042f8ec85b7c2070',
# 6 -> 7
'32510bfbacfbb9befd54415da243e1695ecabd58c519cd4bd2061bbde24eb76a19d84aba34d8de287be84d07e7e9a30ee714979c7e1123a8bd9822a33ecaf512472e8e8f8db3f9635c1949e640c621854eba0d79eccf52ff111284b4cc61d11902aebc66f2b2e436434eacc0aba938220b084800c2ca4e693522643573b2c4ce35050b0cf774201f0fe52ac9f26d71b6cf61a711cc229f77ace7aa88a2f19983122b11be87a59c355d25f8e4',
# 7 -> 6
'32510bfbacfbb9befd54415da243e1695ecabd58c519cd4bd90f1fa6ea5ba47b01c909ba7696cf606ef40c04afe1ac0aa8148dd066592ded9f8774b529c7ea125d298e8883f5e9305f4b44f915cb2bd05af51373fd9b4af511039fa2d96f83414aaaf261bda2e97b170fb5cce2a53e675c154c0d9681596934777e2275b381ce2e40582afe67650b13e72287ff2270abcf73bb028932836fbdecfecee0a3b894473c1bbeb6b4913a536ce4f9b13f1efff71ea313c8661dd9a4ce',
# 8 -> 1
'315c4eeaa8b5f8bffd11155ea506b56041c6a00c8a08854dd21a4bbde54ce56801d943ba708b8a3574f40c00fff9e00fa1439fd0654327a3bfc860b92f89ee04132ecb9298f5fd2d5e4b45e40ecc3b9d59e9417df7c95bba410e9aa2ca24c5474da2f276baa3ac325918b2daada43d6712150441c2e04f6565517f317da9d3',
# 9 ->
'271946f9bbb2aeadec111841a81abc300ecaa01bd8069d5cc91005e9fe4aad6e04d513e96d99de2569bc5e50eeeca709b50a8a987f4264edb6896fb537d0a716132ddc938fb0f836480e06ed0fcd6e9759f40462f9cf57f4564186a2c1778f1543efa270bda5e933421cbe88a4a52222190f471e9bd15f652b653b7071aec59a2705081ffe72651d08f822c9ed6d76e48b63ab15d0208573a7eef027',
# 10 ->
'466d06ece998b7a2fb1d464fed2ced7641ddaa3cc31c9941cf110abbf409ed39598005b3399ccfafb61d0315fca0a314be138a9f32503bedac8067f03adbf3575c3b8edc9ba7f537530541ab0f9f3cd04ff50d66f1d559ba520e89a2cb2a83',
# 11 - > 3, 4
'32510ba9babebbbefd001547a810e67149caee11d945cd7fc81a05e9f85aac650e9052ba6a8cd8257bf14d13e6f0a803b54fde9e77472dbff89d71b57bddef121336cb85ccb8f3315f4b52e301d16e9f52f904',
)
def strxor(a, b):
if len(a) > len(b):
return "".join([chr(ord(x) ^ ord(y)) for (x, y) in zip(a[:len(b)], b)])
else:
return "".join([chr(ord(x) ^ ord(y)) for (x, y) in zip(a, b[:len(a)])])
def main():
MIN_MSG_LEN = min(len(i.decode('hex')) for i in MSGS)
POSSIBLE_LETTERS_XOR = set([ # Set of all XORed results of ascii letters [a-zA-Z]
'\x01', '\x03', '\x02', '\x05', '\x04', '\x07', '\x06', '\t', '\x08', '\x0b', '\n', '\r',
'\x0c', '\x0f', '\x0e', '\x11', '\x10', '\x13', '\x12', '\x15', '\x14', '\x17', '\x16',
'\x19', '\x18', '\x1b', '\x1a', '\x1d', '\x1c', '\x1f', '\x1e', '!', ' ', '#', '"', '%',
'$', "'", '&', ')', '(', '+', '*', '-', ',', '/', '.', '1', '0', '3', '2', '5', '4',
'7', '6', '9', '8', ';', ':', '=', '<', '?', '>'
])
# Key guesses based on next part: (see comments)
# you can delete all guesses except the first one and try to guess the key
# KEY = strxor(MSGS[10].decode('hex'), 'The ')
# KEY = strxor(MSGS[5].decode('hex'), 'There are ')
# KEY = strxor(MSGS[3].decode('hex'), 'The ciphertext ')
# KEY = strxor(MSGS[10].decode('hex'), 'The secret message is ') # The end is not correct
# KEY = strxor(MSGS[5].decode('hex'), 'There are two types of ')
# KEY = strxor(MSGS[7].decode('hex'), 'We can see the point where ')
# KEY = strxor(MSGS[7].decode('hex'), ' The Concise OxfordDictionaries ') # Interesting; Step back
# KEY = strxor(MSGS[5].decode('hex'), 'There are two types of crypto')
# KEY = strxor(MSGS[6].decode('hex'), 'There are two types of cyptography')
# KEY = strxor(MSGS[0].decode('hex'), 'We can factor the number 15 with quantum')
# KEY = strxor(MSGS[3].decode('hex'), 'The ciphertext produced by a weak encryption ')
# KEY = strxor(MSGS[10].decode('hex'), 'The secret message is: When using a stream cipher')
# KEY = strxor(MSGS[3].decode('hex'), 'The ciphertext produced by a weak encryption algorithm ')
# KEY = strxor(MSGS[10].decode('hex'), 'The secret message is: When using a stream cipher, never use ')
# KEY = strxor(MSGS[6].decode('hex'), 'There are two types of cyptography: one that allows the Government ')
# KEY = strxor(MSGS[0].decode('hex'), 'We can factor the number 15 with quantum computers. We can also factor ')
# KEY = strxor(MSGS[10].decode('hex'), 'The secret message is: When using a stream cipher, never use the key more than ')
# KEY = strxor(MSGS[3].decode('hex'), 'The ciphertext produced by a weak encryption algorithm looks as good as ciphertext ')
KEY = strxor(MSGS[6].decode('hex'), 'There are two types of cyptography: one that allows the Government to use brute force to ')
# Trying to decrypt all ciphertexts with KEY:
for x, m in enumerate(MSGS):
print x, strxor(m.decode('hex'), KEY)
print '\n' * 4
# Here I have tried to find some clue about the hint:
# space xor letter = switched case of letter (e.g. 'A' xor ' ' = 'a')
# but haven't found anything interesting
# Then I added `*` symbol that shows the same letters in 2 messages (or ciphertexts)
# So I realized that some messages have the same 3-4 letters on the beginning
# and it's most likely "The "
def magic(c):
if c == '\x00': # The symbols are the same ('A' xor 'A' = '\x00')
return '*'
if c in string.ascii_letters: # It's probably space xor letter
return c
return '_'
for c1, c2 in combinations(MSGS, 2):
xm = strxor(c1.decode('hex'), c2.decode('hex'))
# Print indexes of ciphertexts and magic(c1 xor x2)
print '{:2} {:2}'.format(MSGS.index(c1), MSGS.index(c2)), ''.join(magic(i) for i in xm)
print '\n' * 4
# Here I have tried to find position of spaces: (it haven't helped much)
ASCII_GRAY = ' .:-=+*#%@'
spaces = [
[0] * MIN_MSG_LEN
for i in range(len(MSGS))
]
for c1, c2 in combinations(MSGS, 2):
xm = strxor(c1.decode('hex'), c2.decode('hex'))
for i, c in enumerate(xm):
if i < MIN_MSG_LEN:
if c in string.ascii_letters:
spaces[MSGS.index(c1)][i] += 1
spaces[MSGS.index(c2)][i] += 1
elif c in POSSIBLE_LETTERS_XOR:
spaces[MSGS.index(c1)][i] -= 1
spaces[MSGS.index(c2)][i] -= 1
mm = max(max(i) for i in spaces)
for s in spaces:
m = max(s)
print ''.join(
(ASCII_GRAY[int(float(i) / mm * (len(ASCII_GRAY) - 1))]
if i > 0 else
'_'
)
for i in s
)
if __name__ == '__main__':
main()
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment