Headline Cipher http://www.cryptoden.com/index.php/algorithms/headline-cipher 2015-07-03T08:41:01+00:00 Joomla! - Open Source Content Management Introduction 2012-08-19T09:38:50+00:00 2012-08-19T09:38:50+00:00 http://www.cryptoden.com/index.php/algorithms/headline-cipher/32-headline Super User mikejcowan@me.com <div class="feed-description"><p style="text-align: left;"><span style="font-family: verdana, geneva; font-size: small;">The Headline puzzle was first published in 1964 in the monthly US National Security Agency newsletter. The readership included the top cryptanalysis brains of the time and so the puzzle had to be tip-top. It was. It had a number of dimensions, each of which required a different crypto skill from decipherment through key recovery to word recognition. Although reputedly just a ‘lunch-time puzzle’ at the NSA, it holds far more of a challenge for the rest of us.</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">There were no personal computers in 1964 so solving was done with pencil and paper, perhaps supported by pattern word lists. Nowadays, however, the computer makes short work of finding the solution. Perhaps five minutes is the maximum it need take, though in some cases one minute is nearer the mark. </span></p> <p><span style="font-family: verdana, geneva; font-size: small;">This makes solving sound like shooting fish in a barrel. What’s the point in doing such an easy thing? The answer is that it’s the chase that’s the fun, not the kill. The task of thinking through a suitable algorithm and then developing the computer program to implement it is where the fun lies. Once that is done solving is admittedly a doddle – until a puzzle turns up with an unexpected twist that defeats the computer. And then the fun begins again, to massage the algorithm and the program to take into account this new feature. </span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Those who are interested in the Headline puzzle (both computer solvers and the many pencil &amp; paper solvers) will find all the information and guidance they could want at <a href="https://sites.google.com/site/theheadlinepuzzle/home">Jude’s website</a>. In this website of mine, I confine myself to enough detail to explain how the puzzle works – and then challenge you to develop your own program to solve it. </span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Just in case you need help, I explain my way of going about it though the beauty of the puzzle is that there are a number of ways in. I also provide a couple of working programs just in case you want proof from the outset that the computer is fully capable of solving.</span></p></div> <div class="feed-description"><p style="text-align: left;"><span style="font-family: verdana, geneva; font-size: small;">The Headline puzzle was first published in 1964 in the monthly US National Security Agency newsletter. The readership included the top cryptanalysis brains of the time and so the puzzle had to be tip-top. It was. It had a number of dimensions, each of which required a different crypto skill from decipherment through key recovery to word recognition. Although reputedly just a ‘lunch-time puzzle’ at the NSA, it holds far more of a challenge for the rest of us.</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">There were no personal computers in 1964 so solving was done with pencil and paper, perhaps supported by pattern word lists. Nowadays, however, the computer makes short work of finding the solution. Perhaps five minutes is the maximum it need take, though in some cases one minute is nearer the mark. </span></p> <p><span style="font-family: verdana, geneva; font-size: small;">This makes solving sound like shooting fish in a barrel. What’s the point in doing such an easy thing? The answer is that it’s the chase that’s the fun, not the kill. The task of thinking through a suitable algorithm and then developing the computer program to implement it is where the fun lies. Once that is done solving is admittedly a doddle – until a puzzle turns up with an unexpected twist that defeats the computer. And then the fun begins again, to massage the algorithm and the program to take into account this new feature. </span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Those who are interested in the Headline puzzle (both computer solvers and the many pencil &amp; paper solvers) will find all the information and guidance they could want at <a href="https://sites.google.com/site/theheadlinepuzzle/home">Jude’s website</a>. In this website of mine, I confine myself to enough detail to explain how the puzzle works – and then challenge you to develop your own program to solve it. </span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Just in case you need help, I explain my way of going about it though the beauty of the puzzle is that there are a number of ways in. I also provide a couple of working programs just in case you want proof from the outset that the computer is fully capable of solving.</span></p></div> Outline of Headline Cipher 2012-08-19T09:42:56+00:00 2012-08-19T09:42:56+00:00 http://www.cryptoden.com/index.php/algorithms/headline-cipher/33-outline-of-headline-cipher Super User mikejcowan@me.com <div class="feed-description"><p><span style="font-family: verdana, geneva; font-size: small;">The Headline puzzle enciphers five newspaper headlines with a matrix derived from a Keyword, a Hat and a Setting. Here is an example:</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Keyword: JAVELIN </span><br /><span style="font-family: verdana, geneva; font-size: small;">Hat: BALLISTA </span><br /><span style="font-family: verdana, geneva; font-size: small;">Setting: SWORD</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">A key block is set up from the Keyword and then stripped by columns in order determined by the Hat to form the mixed alphabet:</span></p> <p><span style="font-family: 'courier new', courier; font-size: small;">BALLISTA</span><br /><span style="text-decoration: underline; font-family: 'courier new', courier; font-size: small;">31564782</span><br /><span style="font-family: 'courier new', courier; font-size: small;">JAVELINB</span><br /><span style="font-family: 'courier new', courier; font-size: small;">CDFGHKMO</span><br /><span style="font-family: 'courier new', courier; font-size: small;">PQRSTUWX</span><br /><span style="font-family: 'courier new', courier; font-size: small;">YZ</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Mixed alphabet: <span style="font-family: 'courier new', courier;">ADQZBOXJCPYLHTVFREGSIKUNMW</span><span style="font-family: 'courier new', courier;"><br /></span></span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Finally the enciphering matrix is built from the mixed alphabet and the Setting. The mixed alphabet forms the top row, representing plaintext characters. The Setting is written vertically in rows 1 to 5, below the first letter of the mixed alphabet. Then the remainder of the mixed alphabet is written in:</span></p> <p><span style="font-family: 'courier new', courier; font-size: small;">plain adqzboxjcpylhtvfregsikunmw</span><br /><span style="font-family: 'courier new', courier; font-size: small;">row1  SIKUNMWADQZBOXJCPYLHTVFREG</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   2  WADQZBOXJCPYLHTVFREGSIKUNM</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   3  OXJCPYLHTVFREGSIKUNMWADQZB</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   4  REGSIKUNMWADQZBOXJCPYLHTVF</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   5  DQZBOXJCPYLHTVFREGSIKUNMWA</span></p> <p>The first headline is enciphered with row 1, the second with row 2 and so on. The five Headlines:</p> <p><span style="font-family: 'courier new', courier; font-size: small;">Third Estate decrees National Assembly.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">King orders closure of Estates.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">Crowd runs riot, Bastille stormed.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">Violence against nobles as many flee.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">Citizen Louis Capet guillotined.</span></p> <p>Encipher to:</p> <p><span style="font-family: 'courier new', courier; font-size: small;">XOTPI YHXSXY IYDPYYH RSXTMRSB SHHYENBZ.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">ISUE BFARFG JYBGKFR BV RGHWHRG.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">TKYBX KDQM KWYG, POMGWRRU MGYKZUX.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">BYKDJTMJ RCRYTPZ TKIDJP RP VRTA ODJJ.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">PKVKBGM HXNKI PDYGV SNKHHXVKMGQ.</span></p> <p><span style="font-family: 'courier new', courier;"> </span></p> <p> </p></div> <div class="feed-description"><p><span style="font-family: verdana, geneva; font-size: small;">The Headline puzzle enciphers five newspaper headlines with a matrix derived from a Keyword, a Hat and a Setting. Here is an example:</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Keyword: JAVELIN </span><br /><span style="font-family: verdana, geneva; font-size: small;">Hat: BALLISTA </span><br /><span style="font-family: verdana, geneva; font-size: small;">Setting: SWORD</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">A key block is set up from the Keyword and then stripped by columns in order determined by the Hat to form the mixed alphabet:</span></p> <p><span style="font-family: 'courier new', courier; font-size: small;">BALLISTA</span><br /><span style="text-decoration: underline; font-family: 'courier new', courier; font-size: small;">31564782</span><br /><span style="font-family: 'courier new', courier; font-size: small;">JAVELINB</span><br /><span style="font-family: 'courier new', courier; font-size: small;">CDFGHKMO</span><br /><span style="font-family: 'courier new', courier; font-size: small;">PQRSTUWX</span><br /><span style="font-family: 'courier new', courier; font-size: small;">YZ</span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Mixed alphabet: <span style="font-family: 'courier new', courier;">ADQZBOXJCPYLHTVFREGSIKUNMW</span><span style="font-family: 'courier new', courier;"><br /></span></span></p> <p><span style="font-family: verdana, geneva; font-size: small;">Finally the enciphering matrix is built from the mixed alphabet and the Setting. The mixed alphabet forms the top row, representing plaintext characters. The Setting is written vertically in rows 1 to 5, below the first letter of the mixed alphabet. Then the remainder of the mixed alphabet is written in:</span></p> <p><span style="font-family: 'courier new', courier; font-size: small;">plain adqzboxjcpylhtvfregsikunmw</span><br /><span style="font-family: 'courier new', courier; font-size: small;">row1  SIKUNMWADQZBOXJCPYLHTVFREG</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   2  WADQZBOXJCPYLHTVFREGSIKUNM</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   3  OXJCPYLHTVFREGSIKUNMWADQZB</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   4  REGSIKUNMWADQZBOXJCPYLHTVF</span><br /><span style="font-family: 'courier new', courier; font-size: small;">   5  DQZBOXJCPYLHTVFREGSIKUNMWA</span></p> <p>The first headline is enciphered with row 1, the second with row 2 and so on. The five Headlines:</p> <p><span style="font-family: 'courier new', courier; font-size: small;">Third Estate decrees National Assembly.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">King orders closure of Estates.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">Crowd runs riot, Bastille stormed.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">Violence against nobles as many flee.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">Citizen Louis Capet guillotined.</span></p> <p>Encipher to:</p> <p><span style="font-family: 'courier new', courier; font-size: small;">XOTPI YHXSXY IYDPYYH RSXTMRSB SHHYENBZ.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">ISUE BFARFG JYBGKFR BV RGHWHRG.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">TKYBX KDQM KWYG, POMGWRRU MGYKZUX.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">BYKDJTMJ RCRYTPZ TKIDJP RP VRTA ODJJ.</span><br /><span style="font-family: 'courier new', courier; font-size: small;">PKVKBGM HXNKI PDYGV SNKHHXVKMGQ.</span></p> <p><span style="font-family: 'courier new', courier;"> </span></p> <p> </p></div> Can you solve the headlines with your computer? 2012-08-19T09:44:39+00:00 2012-08-19T09:44:39+00:00 http://www.cryptoden.com/index.php/algorithms/headline-cipher/34-can-you-solve-the-headlines Super User mikejcowan@me.com <div class="feed-description"><p>The puzzle comprises enciphered Headlines. No other information is given. Here is an example:<br /> <br />(1) GJSUJD GDCUUSU DHNPGCE: USEJIS TOSSU PE XJEPG. <br />(2) BMKKLRK DMK GHMU MUJ DRUNAI GVVQ. <br />(3) YVWPX FATXL KEVPAPF EIWOQ ABXL WD HEVYC. <br />(4) VKSFSE TBOKTZTBQFNR TB HTXXNK IXLF <br />(5) TWJA WHLBHP VWTKHLR WHZ UBJJBIR KWJR.</p> <p>The first step is to decipher the headlines. Can you do it? If you can’t then read below.</p> </div> <div class="feed-description"><p>The puzzle comprises enciphered Headlines. No other information is given. Here is an example:<br /> <br />(1) GJSUJD GDCUUSU DHNPGCE: USEJIS TOSSU PE XJEPG. <br />(2) BMKKLRK DMK GHMU MUJ DRUNAI GVVQ. <br />(3) YVWPX FATXL KEVPAPF EIWOQ ABXL WD HEVYC. <br />(4) VKSFSE TBOKTZTBQFNR TB HTXXNK IXLF <br />(5) TWJA WHLBHP VWTKHLR WHZ UBJJBIR KWJR.</p> <p>The first step is to decipher the headlines. Can you do it? If you can’t then read below.</p> </div> Can you recover the matrix & Setting? 2012-08-19T09:45:29+00:00 2012-08-19T09:45:29+00:00 http://www.cryptoden.com/index.php/algorithms/headline-cipher/35-can-you-recover-matrix Super User mikejcowan@me.com <div class="feed-description"><p><span style="font-family: verdana, geneva; font-size: small;">Having solved the headlines we can construct a partial matrix of plain and cipher equivalents for each headline. From this can you recover the full matrix and the Setting? If not, read on below.</span></p> </div> <div class="feed-description"><p><span style="font-family: verdana, geneva; font-size: small;">Having solved the headlines we can construct a partial matrix of plain and cipher equivalents for each headline. From this can you recover the full matrix and the Setting? If not, read on below.</span></p> </div> Can you recover the Key & Hat? 2012-08-19T09:51:49+00:00 2012-08-19T09:51:49+00:00 http://www.cryptoden.com/index.php/algorithms/headline-cipher/36-can-you-recover-key Super User mikejcowan@me.com <div class="feed-description"><p><span style="font-family: verdana, geneva; font-size: small;">The third step is to recover the mixed alphabet, then the Key and the Hat. Your computer can do this if you give it a suitable program. Can you do this? If not then read on.</span></p> </div> <div class="feed-description"><p><span style="font-family: verdana, geneva; font-size: small;">The third step is to recover the mixed alphabet, then the Key and the Hat. Your computer can do this if you give it a suitable program. Can you do this? If not then read on.</span></p> </div>