Posted in the Cryptography Forum
#1 Mar 27, 2011
kj9 s9p 95s b6m eup bxl khr 1y5 ln8 iix g39 qn5 qkl rjg h2y k6u wy3 lux tbw f4a vcv g7m
d3d m7f lit ls3 f47 6gk ary l4u euh der hx6 8hm oj7 jiw aab 1i2 lvr 368 gqh tsm x1g 9ou
lxw 8jf n4v b2u nv7 b75 gki 3qm ajq m3g pbr cnw fcp szb 57b 38g m2h iva axh fuf py3
dl1 dm8 59e mb2 aks is7 v6k 7au lfj 5cv 9i4 fkf 2nw ujr h3r 1tl ec7 yr4 svd ueu exi j6h
Currently a $10,000 reward.
#2 Mar 28, 2011
Remember #2: The system must not require secrecy and can be stolen by the enemy without causing trouble."
Where is the system described? If the cipher does not require secrecy, the author should be able to publish complete details of how it works, without compromising its security.
Has he done this? If so, where? It's not on the page linked.
Add your comments below
|CYPHER : pehopouhir||Dec 5||Vijai||2|
|What kind of code is this ? and how to decode it ?||Dec 5||daydreaming||1|
|Trusted third Party 's security and availabili...||Nov 29||M Danyal||1|
|Cryptic images||Nov '14||jonlin||1|
|Man Behind Secret Code at CIA Offers New Hint||Nov '14||wichita-rick||2|
|Solve this?||Nov '14||Chaos||1|
Find what you want!
Search Cryptography Forum Now
Copyright © 2014 Topix LLC