I wrote the author of the challenge.  He responded (quoted with
permission)

<quote>

If you had received my previous email, with accompnaying URL (below),
you would know how I encrypted this message and have my source code.

> Will you provide source to the encryption code?

Yes.  See:

    http://www.well.com/user/abs/Crypto/

> Avoid software which uses secret algorithms. This is not considered a
> safe means of protecting data. If the vendor isn't confident that its
> encryption method can withstand scrutiny, then you should be wary of
> trusting it. 

I couldn't agree more.  That's why I'm inviting attack.

To be clear, the contents of message2.bin were created by xor-ing my
English plain text with a chunk of a jpg file which is NOT on the web.
It is a picture I took myself and scanned.  I am interested to see if
anyone can use statistical techniques or special knowledge of jpg's to
crack this without the key.
</quote>

-- 
Mike Stay
Programmer / Crypto guy
AccessData Corp.
mailto:[EMAIL PROTECTED]

Reply via email to