theta
04-20-2012, 01:59 AM
Hi...does anybody have (or accept the challenge of producing) a Lorenz Cipher machine (SZ40). The WWII German Army cipher machine. Would be nice to get a fully working simulation as it would help my studies of cryptography.
There are several articles on wikipedia, with one dedicated to the breaking of the Lorenze Cipher. The output is then produced in
Lorenz SZ40 http://en.wikipedia.org/wiki/Lorenz_SZ40/42 (http://en.wikipedia.org/wiki/Lorenz_SZ40/42)
Cryptanalysis of the Lorenz Cipher http://en.wikipedia.org/wiki/Cryptan..._Lorenz_cipher (http://en.wikipedia.org/wiki/Cryptanalysis_of_the_Lorenz_cipher)
It uses XOR encryption with added layers of complexity. The below macro code is useful for basic XOR encryption.
http://www.mediafire.com/?3ba2ta92lfqhfg7 (http://www.mediafire.com/?3ba2ta92lfqhfg7)
The output should be in the original format ITA2 http://en.wikipedia.org/wiki/Baudot_code#ITA2 (http://en.wikipedia.org/wiki/Baudot_code#ITA2) with a formula / lookup table to convert this into plaintext?
This would be a fun challenge :)
NOTE : Would also be interested in any example of cryptography or cipher usage in excel (enigma, blowfish) etc and reverse engineering / decoding tools.
There are several articles on wikipedia, with one dedicated to the breaking of the Lorenze Cipher. The output is then produced in
Lorenz SZ40 http://en.wikipedia.org/wiki/Lorenz_SZ40/42 (http://en.wikipedia.org/wiki/Lorenz_SZ40/42)
Cryptanalysis of the Lorenz Cipher http://en.wikipedia.org/wiki/Cryptan..._Lorenz_cipher (http://en.wikipedia.org/wiki/Cryptanalysis_of_the_Lorenz_cipher)
It uses XOR encryption with added layers of complexity. The below macro code is useful for basic XOR encryption.
http://www.mediafire.com/?3ba2ta92lfqhfg7 (http://www.mediafire.com/?3ba2ta92lfqhfg7)
The output should be in the original format ITA2 http://en.wikipedia.org/wiki/Baudot_code#ITA2 (http://en.wikipedia.org/wiki/Baudot_code#ITA2) with a formula / lookup table to convert this into plaintext?
This would be a fun challenge :)
NOTE : Would also be interested in any example of cryptography or cipher usage in excel (enigma, blowfish) etc and reverse engineering / decoding tools.