Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

funny fractal encryption... A Challenge?

19 views
Skip to first unread message

Chris M. Thomasson

unread,
Dec 27, 2021, 4:38:39 PM12/27/21
to
Here is 500 a's encrypted with a different key.... Can you bust the key
I used? This cipher is _not_ secure at all! So it should be able to be
busted wide open, for sure.

500 a's
_______________________________________________
0.3435188620054577 0.39616076264047273
0.6133322945655849 0.3272582365540972

69 56 33 C4 76 81 D0 83 03 E0 30 50 63 AE 1F EA 44 B5 06 78 E5 D6 D5 51
E2 56 FB 43 8D 7B E2 63 CC 0D 68 63 9C 55 57 0B 14 3B 21 7D CB 9B 1F 97
80 80 9A F5 1C C1 6D D1 F1 9E E6 F3 7C CC 31 A2 6C 4F 42 0D EF EC 1F 17
D3 42 50 73 2E 61 2B FE 00 F0 10 C0 A2 4C 72 5C 63 23 0A 49 92 7A D1 01
35 AA 0A 35 4C E3 2C 0F 57 36 C2 3F 2F D8 58 BD BA 1A 8E 53 5B 8F 1B D5
3D CE 31 99 A1 77 F7 CD 7B 71 10 BB DC EF 90 88 DB DE 52 86 80 3C F5 83
05 0B 66 72 24 2B 04 0D 91 D3 13 9D CA 0A F3 44 FE 6D 48 CF F1 84 89 84
73 E3 9C 06 5C BD 39 DA AA BB 28 1E E0 CB 61 50 84 30 E9 C3 6E 6B 45 DA
87 1A 32 2F 82 B1 58 25 E0 64 A4 AA 9D BE 78 5C 34 0C 45 AB 92 FE D1 05
9F FC 2D 81 9F 6D 10 DE 56 1C F9 D1 AB AC 1D 6D 3C 62 FB 7B C3 39 F0 D0
CD A1 70 83 B7 5C 22 07 45 4D BA 4D EA 97 79 DA 27 FD 2B BF 14 E0 4D 10
37 3A 00 DE F8 13 76 CD 16 8E AA 08 6C BB F7 3F D1 06 5B 72 17 46 31 4B
72 61 41 95 E0 73 39 9D 67 AD C0 20 76 86 33 72 4D DF 50 D4 A7 08 32 53
D5 5D 32 30 63 C0 F2 30 1E B3 26 E1 75 8E EE 66 D1 09 E8 36 A6 C2 D7 DB
C4 59 92 E0 03 BC 8F 9A 6A E8 3C C4 FE 84 FF 20 95 00 EF CC C8 C8 42 11
DA 8B 03 91 E1 AA 6D 46 C4 D0 8C 58 B8 4B 41 9B BE 1B FD 79 53 E3 E5 42
0A 3E 0B EB B7 4B 4D F5 26 3A CE 7A ED 07 63 82 47 74 53 B1 FD 1F 42 2B
9A D1 09 43 C7 CF 8B 9C 33 36 81 D2 88 9B F0 41 82 BF 09 60 CD AD F3 D8
0F 95 16 78 77 0A DC 71 C6 44 32 3A E6 3D BF E6 55 A4 61 AC 91 E8 DF 0A
0F A9 D7 F5 3C DC 4D B0 C5 61 42 FD E9 44 90 8B 35 F4 3E 27 33 E9 EE 85
35 C8 3D 1E 88 69 7F 4A 2B C2 F0 6C 3A 38 80 6B 85 A6 E6 70
_______________________________________________


Can you get at the key?

http://funwithfractals.atspace.cc/ffe/

Chris M. Thomasson

unread,
Dec 27, 2021, 4:40:56 PM12/27/21
to
On 12/27/2021 1:38 PM, Chris M. Thomasson wrote:
> Here is 500 a's encrypted with a different key.... Can you bust the key
> I used? This cipher is _not_ secure at all! So it should be able to be
> busted wide open, for sure.
>
> 500 a's
> _______________________________________________
[snip cpihertext]
> _______________________________________________
>
>
> Can you get at the key?
>
> http://funwithfractals.atspace.cc/ffe/

Keep in mind, this cipher has no diffusion at all!

Chris M. Thomasson

unread,
Dec 27, 2021, 4:44:10 PM12/27/21
to
On 12/27/2021 1:38 PM, Chris M. Thomasson wrote:
Another ciphertext of 500 a's using the exact same key:
________________________________________________
0.1278408185810377 0.21461178418977364
0.13341931399491347 0.38927175620252324

8C 33 A6 79 9F ED 69 4A BA 9E BF 6C 47 BF 47 41 DC D9 FD 58 1B 0D 91 05
ED BD 2A 24 C0 19 E1 AB 0A AA 8E 79 57 88 F2 E0 C0 FD 51 B5 C8 E3 3F 52
64 58 EC 79 84 F5 F7 7A 8D A0 C4 ED 2F D7 60 38 5B 04 43 ED 38 DB C6 E0
C8 EF 6E A2 83 2A E1 CC 61 BC D1 A5 5C 3C 80 0B E0 60 83 CE 18 F0 0A E5
91 05 20 61 7F FB BD D6 F5 B9 DD 57 58 31 1C D5 04 5F 4C 92 BF 5A 90 DA
50 05 5D 12 84 9F 1E A0 CD 9E 77 2F 07 7D 0A B9 8A 9E 05 9C 3E FA 23 61
00 3D A8 E2 6B AF E3 EA 75 AA 7D A2 71 BD 88 57 CC 6A CC AF FE DE B9 51
55 63 47 7F 75 7A D5 C0 6F 13 2A 64 92 F7 68 3B D9 C2 98 1D 46 3F 7D CA
C4 F8 C2 7D 71 D8 E3 BC 89 6F 96 27 54 57 74 03 6A 2B E6 5F 88 8D DC 3D
89 4E 80 4F E2 56 C4 45 F0 DD 2B FC 7A D9 5C 54 23 48 5B 1A 6E 75 92 73
AE 8F C4 50 34 6F 03 F2 44 05 46 21 B9 39 DD EE C9 E0 C4 23 D8 ED A7 95
16 C5 BA C7 C7 99 25 58 29 93 9E 58 D8 44 CB AE 3E E3 1C 88 E8 2B 74 25
8D EA 82 F6 F8 48 B3 11 46 3F F6 6D B1 DC 14 8D 8B 67 8C 84 F5 AA 9D FA
D3 F1 38 1C 25 F5 3D C0 51 CD 20 40 2F FC BF A1 D6 A4 64 84 8B 1F 07 36
B0 D5 06 86 BB 26 60 18 0E 11 FF C3 54 B2 EC 1A 62 F6 18 1B 64 6D CD 34
05 AA 29 98 3B 77 CE DD 52 F1 8A FC 32 23 CF 40 8C D1 3A FB 58 9F 30 79
D8 A9 00 D1 41 9B 50 EA 0B 68 C9 01 F1 84 AE 6C C3 BD 6D EB 56 D2 86 9F
65 36 17 DA 8D 69 CC 35 3A 87 D9 FC C7 1A E0 06 83 4E 62 BB 55 29 29 42
26 F3 29 86 07 D6 46 CE FA 71 E9 26 F8 37 C2 7D 4E 1B D1 3A 46 BF 66 E8
DE BC 29 DA BF FD E3 DF 7E 60 38 C5 D3 32 BA 43 A6 B9 4D 29 09 98 69 F1
99 AF 43 09 F0 1F E3 AF 0C 9D 91 84 97 69 2B C5 04 AF 85 36
________________________________________________

Chris M. Thomasson

unread,
Dec 27, 2021, 4:45:13 PM12/27/21
to
Just one more:
________________________________________________
0.5158308169847121 0.5878099418571999
0.550552059278511 0.4335576544223137

C0 D6 D6 F5 51 99 9B 54 57 F6 B7 CF D0 5A 16 80 15 FA EA 00 3E 49 B3 DC
08 D1 B9 0F 3C F3 35 7B B7 A1 B0 F9 BE 92 CD 74 EC BE 99 B2 4E 9B 32 91
F6 92 C3 31 23 99 EB 77 EB 39 99 16 F9 8F E1 D0 82 06 AB 9B 26 CB 6F 0E
78 F3 D4 8B B7 B6 C7 CD 32 9E 7D F2 7B 3F 81 7D 0E 6F 6B 6F A0 EF 63 E1
69 C1 B6 6C BF 55 E6 83 D1 9E 3A 03 3E 7C 47 5C 69 1C 27 C2 5A 7F 3C DC
67 71 DE 94 13 F2 67 B5 7E 12 B5 35 78 51 F4 4B BC 17 7B B1 DD 6B 58 F5
B8 C4 BA 24 30 68 39 52 EA E9 0E 0B 9C A8 5B 4E B9 AE 7A 15 D1 3D 58 32
D4 C6 B3 9D DA A3 6E 38 B2 66 D0 72 ED 14 08 5B 39 AB E4 B3 1F 34 1E 94
2B 43 B4 96 25 10 B6 46 E0 A0 B6 6C 38 CB 27 BD 91 73 44 5A 07 4E C9 EA
9C DE AA ED 99 BA 7D 37 67 B9 06 58 F0 53 52 2A 9A 15 FA E6 21 2D 85 94
D4 54 D2 FA 66 70 0C B0 3A DE 1C BB C0 78 7D C4 B4 48 36 32 36 F0 49 14
D6 E4 15 E5 9F F6 B0 69 61 5A 7D 49 89 4D EF 13 BC 56 DA EB 0D DF 6B 8E
94 D2 6F EF 79 3A E1 44 14 A9 DD EC 68 25 39 F7 F0 FE 4A 58 1D 0A 26 25
8B E0 53 C9 8F 84 6A 6E CC 82 28 C3 AF 8B 29 8B D4 45 38 10 2E D4 06 4D
50 C6 05 D8 18 A0 83 73 52 E2 89 23 E0 32 B1 0F 07 4A 67 AD FB 7E 56 14
12 94 EA 70 0E FF EF 4C CB 0F 63 8C A0 EA D3 C9 25 12 6B 7F D2 AD 93 7A
FA F6 B7 F7 4A C2 FD 66 B6 95 CB 43 05 8B 8F E8 9B 61 71 48 3E 06 D4 E8
6D 64 8C F0 85 BC 87 9A 3F BC 01 F0 55 D5 35 5D 94 90 1A 05 CA DE CF 43
31 29 F0 F0 45 59 DC 7E ED EE 92 B0 3A CE 60 67 7C 7F 62 D5 E8 9D 75 6A
75 5C B9 78 BA 6B A0 4F D9 0F 8A 5C 92 D4 00 73 63 5C BC D7 1D 9A 06 D8
CF C4 DF C7 1B 77 15 20 D2 E4 39 DD 45 8B 4B CB BD 9C E1 33
________________________________________________

Chris M. Thomasson

unread,
Dec 27, 2021, 4:49:07 PM12/27/21
to
On 12/27/2021 1:38 PM, Chris M. Thomasson wrote:
> Here is 500 a's encrypted with a different key.... Can you bust the key
> I used? This cipher is _not_ secure at all! So it should be able to be
> busted wide open, for sure.
>
> 500 a's
> _______________________________________________
[snip ciphertext]
> _______________________________________________
>
>
> Can you get at the key?
>
> http://funwithfractals.atspace.cc/ffe/

No rules, for Eve has no rules. If interested, post here!

Chris M. Thomasson

unread,
Dec 27, 2021, 4:57:27 PM12/27/21
to
Hint! If you alter a ciphertext byte, it will only alter that byte, no
diffusion ...

Chris M. Thomasson

unread,
Jan 3, 2022, 3:15:05 AM1/3/22
to
On 12/27/2021 1:38 PM, Chris M. Thomasson wrote:
Very verbose, and crude, "write up", with examples! ;^)

https://github.com/ChrisMThomasson/fractal_cipher/blob/master/FFE/Pre-Alpha%20Rough%20Draft%20FFE%20Tutorial.pdf

For Leo!

Leo

unread,
May 21, 2022, 11:30:16 AM5/21/22
to
On Mon, 3 Jan 2022 00:15:02 -0800, Chris M. Thomasson wrote:

> On 12/27/2021 1:38 PM, Chris M. Thomasson wrote:
>> Here is 500 a's encrypted with a different key.... Can you bust the
>> key I used? This cipher is _not_ secure at all! So it should be
>> able to be busted wide open, for sure. 500 a's
>> _______________________________________________
>> Can you get at the key?
>>
>> http://funwithfractals.atspace.cc/ffe/
>
> Very verbose, and crude, "write up", with examples! ;^)
>
> https://github.com/ChrisMThomasson/fractal_cipher/blob/master/FFE/Pre-
Alpha%20Rough%20Draft%20FFE%20Tutorial.pdf
>
> For Leo!

Does the Python examples in that PDF, the C code in the repo and the
web version you posted all produce the same results?

--
Leo

Chris M. Thomasson

unread,
May 21, 2022, 3:17:06 PM5/21/22
to
I don't think so. Iirc, the online version uses three Julia sets in the
secret key, while the PDF version uses just one. The online version uses
one of my experimental algorithms that mixes different Julias to create
the fractal.

https://www.facebook.com/groups/772574203128420/posts/1360392627679905

One of my friends named it the "Mulia"... ;^)


They all produce a different result for each run because of the random
axes. So, all of the following ciphertexts in the online version using
the default secret key decrypt to the same plaintext between the quotes
"This is plaintext":

http://funwithfractals.atspace.cc/ffe

______________
0.18187934248695653 0.20102351676281083
0.2889072363253324 0.09012324255313815

CA FF 98 6E 31 99 95 7E AD 2F 6D A4 76 94 FD C4 3A
______________


______________
0.12898822412464417 0.32742429738543566
0.21324339391518043 0.11975318702370624

D9 6A 4C 32 BD 94 10 4C C8 3B A5 E3 CB D7 67 3A 99
______________


______________
0.34214695597988365 0.4732762354527929
0.5317924861132026 0.472176111103508

FC 20 9A 7C 71 D9 E2 F5 76 5D 12 C0 4C D6 94 53 2B
______________


I got sidetracked with this project and need to get back into it.

Sorry for any confusion! ;^o

Chris M. Thomasson

unread,
May 21, 2022, 3:19:50 PM5/21/22
to
On 5/21/2022 12:17 PM, Chris M. Thomasson wrote:
> On 5/21/2022 8:30 AM, Leo wrote:
>> On Mon, 3 Jan 2022 00:15:02 -0800, Chris M. Thomasson wrote:
>>
>>> On 12/27/2021 1:38 PM, Chris M. Thomasson wrote:
>>>> Here is 500 a's encrypted with a different key.... Can you bust the
>>>> key I used? This cipher is _not_ secure at all! So it should be
>>>> able to be busted wide open, for sure. 500 a's
>>>> _______________________________________________
>>>> Can you get at the key?
>>>>
>>>> http://funwithfractals.atspace.cc/ffe/
>>>
>>> Very verbose, and crude, "write up", with examples! ;^)
>>>
>>> https://github.com/ChrisMThomasson/fractal_cipher/blob/master/FFE/Pre-
>> Alpha%20Rough%20Draft%20FFE%20Tutorial.pdf
>>>
>>> For Leo!
>>
>> Does the Python examples in that PDF, the C code in the repo and the
>> web version you posted all produce the same results?
>>
>
> I don't think so. Iirc, the online version uses three Julia sets in the
> secret key, while the PDF version uses just one. The online version uses
> one of my experimental algorithms that mixes different Julias to create
> the fractal.
>
> https://www.facebook.com/groups/772574203128420/posts/1360392627679905
>
> One of my friends named it the "Mulia"... ;^)
[...]

Here is a screenshot of the damn FB link:

https://i.ibb.co/NWFckxq/image.png

0 new messages