From: Neil Smith Date: Thu, 5 Nov 2020 15:35:40 +0000 (+0000) Subject: Done challenge 2 X-Git-Url: https://git.njae.me.uk/?a=commitdiff_plain;h=a8fe7438ec48719c7807bdc82fd35f6c8a690e24;p=cipher-challenge.git Done challenge 2 --- diff --git a/2020/2020-a-challenge2.ipynb b/2020/2020-a-challenge2.ipynb new file mode 100644 index 0000000..be5233b --- /dev/null +++ b/2020/2020-a-challenge2.ipynb @@ -0,0 +1,218 @@ +{ + "cells": [ + { + "cell_type": "code", + "execution_count": 8, + "metadata": { + "Collapsed": "false" + }, + "outputs": [], + "source": [ + "from szyfrow.affine import *\n", + "from szyfrow.keyword_cipher import *" + ] + }, + { + "cell_type": "code", + "execution_count": 2, + "metadata": { + "Collapsed": "false" + }, + "outputs": [], + "source": [ + "challenge_number = 2\n", + "plaintext_a_filename = f'plaintext.{challenge_number}a.txt'\n", + "plaintext_b_filename = f'plaintext.{challenge_number}b.txt'\n", + "ciphertext_a_filename = f'ciphertext.{challenge_number}a.txt'\n", + "ciphertext_b_filename = f'ciphertext.{challenge_number}b.txt'" + ] + }, + { + "cell_type": "code", + "execution_count": 9, + "metadata": { + "Collapsed": "false" + }, + "outputs": [], + "source": [ + "ca = open(ciphertext_a_filename).read()\n", + "cb = open(ciphertext_b_filename).read()\n", + "scb = sanitise(cb)" + ] + }, + { + "cell_type": "code", + "execution_count": 6, + "metadata": { + "Collapsed": "false" + }, + "outputs": [ + { + "name": "stdout", + "output_type": "stream", + "text": [ + "19 18 True \n", + "\n", + "The decrypt of the first mission intercept has raised a number of questions about the spyclist operation, if that is what it is, but it has also triggered enquiries about the personnel referenced in that message. Our counterintelligence unit have asked me to task you with enquiries about the names mentioned there, in particular: Jessica; Wilhelm; Nikolaus; Tirpitzufer. It is possible that these are pseudonyms or code names, but they do not appear in our records and CI branch would be very interested in anything you can find out about them in relation to Nazi spy operations. I followed up on the SIS report that Hitler Youth groups travelling abroad were asked to complete a detailed questionnaire, checking if Harry had links that could help with this, and he sent me the attached message that was photographed by a BOSS undercover operative in Berlin. He told me that it had been exfiltrated from Abwehr headquarters and appears to be a request for approval for a new mission, though neither H nor I have had time to break it, so I look forward to receiving your decrypts. We believe the message has been enciphered using a keyword substitution cipher and given that we are not sure how serious the spyclist threat might be we would be grateful if you could decipher it quickly. The message was also a reminder to me that our own security is an important consideration, so I will also switch to a keyword substitution cipher for the next Mission Briefing. Pearl.\n", + "\n" + ] + } + ], + "source": [ + "(m_a, a_a, o_a), score_a = affine_break(ca)\n", + "print(m_a, a_a, o_a, '\\n')\n", + "pa = affine_decipher(ca, m_a, a_a, o_a)\n", + "print(pa)" + ] + }, + { + "cell_type": "code", + "execution_count": 7, + "metadata": { + "Collapsed": "false" + }, + "outputs": [ + { + "data": { + "text/plain": [ + "1471" + ] + }, + "execution_count": 7, + "metadata": {}, + "output_type": "execute_result" + } + ], + "source": [ + "open(plaintext_a_filename, 'w').write(pa)" + ] + }, + { + "cell_type": "code", + "execution_count": 17, + "metadata": { + "Collapsed": "false" + }, + "outputs": [ + { + "name": "stdout", + "output_type": "stream", + "text": [ + "archerys KeywordWrapAlphabet.from_last \n", + "\n", + "attdctioc w our missioc to dmnde sympathisdrs ic thd ul dstanfishmdct is goicg wdff afthough thd rdkdct ickrdasd ic eipfomatik tdcsioc has sigcibikactfy ickrdasde thd risl bor our agdcts ic kommucikaticg with thdir hacefdrs. with tdfdgram trabbik ucedr dchackde supdrvisioc ny thd ul ictdffigdckd orgacisatiocs it is afso ickrdasicgfy eibbikuft bor thd agdcts ace thdir hacefdrs to rdpatriatd ictdffigdckd rdports ob acy sigcibikackd. thd usd ob naclicg kiphdrs is co focgdr rdgarede as sdkurd ace edspitd its onvious aevactagds, thd dcigma is too vafuanfd to us to affow its usd ndhice dcdmy ficds. bor cow, wd ard dckouragicg our agdcts to usd a mix ob ldywore ace tracspositioc kiphdrs as taught ic thdir nasik traicicg, sickd thdsd ard rdfianfd ace eo cot rdquird thd agdcts to nd ic possdssioc ob mord thac a sdrids ob ldy wores ace phrasds, whikh thdy ard wdff anfd to mdmorisd. as thd quactity ob sigcafs trabbik ickrdasds wd wiff cdde to rdkocsiedr our protokofs, nut bor cow i thicl our bokus shoufe nd oc edvdfopicg sdkurd kommucikatioc khaccdfs, with kut-outs to isofatd our mord vafuanfd assdts. i eiskussde this issud with my kouctdrpart ic edpartmdct ih who is a lddc kykfist ace hd maed a rathdr icgdcious suggdstioc that wd might mald gooe usd ob thd hitfdr youth. a cumndr ob partids havd nddc icvitde to visit thd ul oc kykficg tours ace hd hae nddc kocsiedricg aslicg thdm to rdkore icbormatioc anout thd fayout ob mifitary ace iceustriaf facemarls as part ob his ictdffigdckd gathdricg opdratioc. it is highfy fildfy that acy war wiff icvofvd a protraktde nomnicg kampaigc ace up to eatd maps wiff nd ob grdat vafud ic our pfaccicg. burthdrmord, thd kouctrysied roae fayouts ic thd ul ard cotorious bor thdir icdbbikidcky ace acy icvasioc, woufe nd sdvdrdfy hampdrde ny our fakl ob lcowfdegd ob tracsport cdtworls. hd hae erabtde ac appardctfy rathdr iccokuous artikfd bor thd cazi kykfist assokiatioc magazicd with a fist ob thicgs that our youcg kykfists might bice ictdrdsticg: imprdss oc your mdmory thd roaes ace paths, viffagds ace towcs, outstaceicg khurkh towdrs ace othdr facemarls so that you wiff cot borgdt thdm. mald a cotd ob thd camds, pfakds, rivdrs, sdas ace mouctaics. pdrhaps you may nd anfd to utifisd thdsd somd timd bor thd ndcdbit ob thd bathdrface. shoufe you komd to a nriegd whikh ictdrdsts you, dxamicd its kocstruktioc ace thd matdriafs usde. fdarc to mdasurd ace dstimatd thd wieth ob strdams. waed through bores so that you wiff nd anfd to bice thdm ic thd earl. i proposd that wd kocsiedr usicg thdsd assdts as thd kut-outs ndtwddc our ucedrkovdr agdcts ace thdir hacefdrs ic thd ul ace our kommucikatiocs cdtworl. thdy ard rdfativdfy brdd to movd arouce thd kouctry ace kac dasify nd traicde to usd erop-obbs ace othdr spykrabt to affow thdm to koffdkt ictdffigdckd rdports ace pass thdm oc. thd marvdffous postd rdstactd systdm affows us to kommucikatd with thdm, ace a suitanfd koednool woufe affow us to tracsmit icstruktiocs ic pfaic tdxt with co risl that thd mdacicg koufe nd eiskdrcde ny kouctdrictdffigdckd opdrativds ic thd postaf sdrvikd. i havd acothdr thought anout how wd might dxpfoit this cdtworl burthdr, howdvdr i cdde to worl through somd mord edtaifs ndbord i eiskuss it with you, ace i wactde to khdkl that you ard happy bor md to affokatd rdsourkds to traic a cumndr ob hitfdr youth ic thd rdquirde sliffs bor this opdratioc. cr.\n", + "\n" + ] + } + ], + "source": [ + "(word_b, wrap_b), score_b = keyword_break_mp(scb, fitness=Ptrigrams)\n", + "print(word_b, wrap_b, '\\n')\n", + "pb = keyword_decipher(cb, word_b, wrap_b)\n", + "print(pb)" + ] + }, + { + "cell_type": "code", + "execution_count": 20, + "metadata": { + "Collapsed": "false" + }, + "outputs": [ + { + "name": "stdout", + "output_type": "stream", + "text": [ + "abwehrstuvxyzcdfgijklmnopq \n", + "\n", + "attention w our mission to embed sympathisers in the uk establishment is going well although the recent increase in diplomatic tension has significantly increased the risk for our agents in communicating with their handlers. with telegram traffic under enhanced supervision by the uk intelligence organisations it is also increasingly difficult for the agents and their handlers to repatriate intelligence reports of any significance. the use of banking ciphers is no longer regarded as secure and despite its obvious advantages, the enigma is too valuable to us to allow its use behind enemy lines. for now, we are encouraging our agents to use a mix of keyword and transposition ciphers as taught in their basic training, since these are reliable and do not require the agents to be in possession of more than a series of key words and phrases, which they are well able to memorise. as the quantity of signals traffic increases we will need to reconsider our protocols, but for now i think our focus should be on developing secure communication channels, with cut-outs to isolate our more valuable assets. i discussed this issue with my counterpart in department ih who is a keen cyclist and he made a rather ingenious suggestion that we might make good use of the hitler youth. a number of parties have been invited to visit the uk on cycling tours and he had been considering asking them to record information about the layout of military and industrial landmarks as part of his intelligence gathering operation. it is highly likely that any war will involve a protracted bombing campaign and up to date maps will be of great value in our planning. furthermore, the countryside road layouts in the uk are notorious for their inefficiency and any invasion, would be severely hampered by our lack of knowledge of transport networks. he had drafted an apparently rather innocuous article for the nazi cyclist association magazine with a list of things that our young cyclists might find interesting: impress on your memory the roads and paths, villages and towns, outstanding church towers and other landmarks so that you will not forget them. make a note of the names, places, rivers, seas and mountains. perhaps you may be able to utilise these some time for the benefit of the fatherland. should you come to a bridge which interests you, examine its construction and the materials used. learn to measure and estimate the width of streams. wade through fords so that you will be able to find them in the dark. i propose that we consider using these assets as the cut-outs between our undercover agents and their handlers in the uk and our communications network. they are relatively free to move around the country and can easily be trained to use drop-offs and other spycraft to allow them to collect intelligence reports and pass them on. the marvellous poste restante system allows us to communicate with them, and a suitable codebook would allow us to transmit instructions in plain text with no risk that the meaning could be discerned by counterintelligence operatives in the postal service. i have another thought about how we might exploit this network further, however i need to work through some more details before i discuss it with you, and i wanted to check that you are happy for me to allocate resources to train a number of hitler youth in the required skills for this operation. nr.\n", + "\n" + ] + } + ], + "source": [ + "word_b, score_b = simulated_annealing_break(scb)\n", + "print(word_b, '\\n')\n", + "pb = keyword_decipher(cb, word_b)\n", + "print(pb)" + ] + }, + { + "cell_type": "code", + "execution_count": 19, + "metadata": { + "Collapsed": "false" + }, + "outputs": [ + { + "data": { + "text/plain": [ + "'attention w our mission to embed sympathisers in the uk establishment is going well although the recent increase in diplomatic tension has significantly increased the risk for our agents in communicating with their handlers. with telegram traffic under enhanced supervision by the uk intelligence organisations it is also increasingly difficult for the agents and their handlers to repatriate intelligence reports of any significance. the use of banking ciphers is no longer regarded as secure and despite its obvious advantages, the enigma is too valuable to us to allow its use behind enemy lines. for now, we are encouraging our agents to use a mix of keyword and transposition ciphers as taught in their basic training, since these are reliable and do not require the agents to be in possession of more than a series of key words and phrases, which they are well able to memorise. as the quantity of signals traffic increases we will need to reconsider our protocols, but for now i think our focus should be on developing secure communication channels, with cut-outs to isolate our more valuable assets. i discussed this issue with my counterpart in department ih who is a keen cyclist and he made a rather ingenious suggestion that we might make good use of the hitler youth. a number of parties have been invited to visit the uk on cycling tours and he had been considering asking them to record information about the layout of military and industrial landmarks as part of his intelligence gathering operation. it is highly likely that any war will involve a protracted bombing campaign and up to date maps will be of great value in our planning. furthermore, the countryside road layouts in the uk are notorious for their inefficiency and any invasion, would be severely hampered by our lack of knowledge of transport networks. he had drafted an apparently rather innocuous article for the nazi cyclist association magazine with a list of things that our young cyclists might find interesting: impress on your memory the roads and paths, villages and towns, outstanding church towers and other landmarks so that you will not forget them. make a note of the names, places, rivers, seas and mountains. perhaps you may be able to utilise these some time for the benefit of the fatherland. should you come to a bridge which interests you, examine its construction and the materials used. learn to measure and estimate the width of streams. wade through fords so that you will be able to find them in the dark. i propose that we consider using these assets as the cut-outs between our undercover agents and their handlers in the uk and our communications network. they are relatively free to move around the country and can easily be trained to use drop-offs and other spycraft to allow them to collect intelligence reports and pass them on. the marvellous poste restante system allows us to communicate with them, and a suitable codebook would allow us to transmit instructions in plain text with no risk that the meaning could be discerned by counterintelligence operatives in the postal service. i have another thought about how we might exploit this network further, however i need to work through some more details before i discuss it with you, and i wanted to check that you are happy for me to allocate resources to train a number of hitler youth in the required skills for this operation. nr.\\n'" + ] + }, + "execution_count": 19, + "metadata": {}, + "output_type": "execute_result" + } + ], + "source": [ + "keyword_decipher(cb, 'abwehr', KeywordWrapAlphabet.from_last)" + ] + }, + { + "cell_type": "code", + "execution_count": 21, + "metadata": { + "Collapsed": "false" + }, + "outputs": [ + { + "data": { + "text/plain": [ + "3403" + ] + }, + "execution_count": 21, + "metadata": {}, + "output_type": "execute_result" + } + ], + "source": [ + "open(plaintext_b_filename, 'w').write(pb)" + ] + }, + { + "cell_type": "code", + "execution_count": null, + "metadata": { + "Collapsed": "false" + }, + "outputs": [], + "source": [] + } + ], + "metadata": { + "jupytext": { + "formats": "ipynb,md" + }, + "kernelspec": { + "display_name": "Python 3", + "language": "python", + "name": "python3" + }, + "language_info": { + "codemirror_mode": { + "name": "ipython", + "version": 3 + }, + "file_extension": ".py", + "mimetype": "text/x-python", + "name": "python", + "nbconvert_exporter": "python", + "pygments_lexer": "ipython3", + "version": "3.7.4" + } + }, + "nbformat": 4, + "nbformat_minor": 4 +} diff --git a/2020/2020-a-challenge2.md b/2020/2020-a-challenge2.md new file mode 100644 index 0000000..80efcc4 --- /dev/null +++ b/2020/2020-a-challenge2.md @@ -0,0 +1,70 @@ +--- +jupyter: + jupytext: + formats: ipynb,md + text_representation: + extension: .md + format_name: markdown + format_version: '1.2' + jupytext_version: 1.3.4 + kernelspec: + display_name: Python 3 + language: python + name: python3 +--- + +```python Collapsed="false" +from szyfrow.affine import * +from szyfrow.keyword_cipher import * +``` + +```python Collapsed="false" +challenge_number = 2 +plaintext_a_filename = f'plaintext.{challenge_number}a.txt' +plaintext_b_filename = f'plaintext.{challenge_number}b.txt' +ciphertext_a_filename = f'ciphertext.{challenge_number}a.txt' +ciphertext_b_filename = f'ciphertext.{challenge_number}b.txt' +``` + +```python Collapsed="false" +ca = open(ciphertext_a_filename).read() +cb = open(ciphertext_b_filename).read() +scb = sanitise(cb) +``` + +```python Collapsed="false" +(m_a, a_a, o_a), score_a = affine_break(ca) +print(m_a, a_a, o_a, '\n') +pa = affine_decipher(ca, m_a, a_a, o_a) +print(pa) +``` + +```python Collapsed="false" +open(plaintext_a_filename, 'w').write(pa) +``` + +```python Collapsed="false" +(word_b, wrap_b), score_b = keyword_break_mp(scb, fitness=Ptrigrams) +print(word_b, wrap_b, '\n') +pb = keyword_decipher(cb, word_b, wrap_b) +print(pb) +``` + +```python Collapsed="false" +word_b, score_b = simulated_annealing_break(scb) +print(word_b, '\n') +pb = keyword_decipher(cb, word_b) +print(pb) +``` + +```python Collapsed="false" +keyword_decipher(cb, 'abwehr', KeywordWrapAlphabet.from_last) +``` + +```python Collapsed="false" +open(plaintext_b_filename, 'w').write(pb) +``` + +```python Collapsed="false" + +``` diff --git a/2020/ciphertext.2a.txt b/2020/ciphertext.2a.txt new file mode 100644 index 0000000..d33e44b --- /dev/null +++ b/2020/ciphertext.2a.txt @@ -0,0 +1 @@ +Hni piwvyjh qb hni bgvoh egoogqx gxhivwijh nko vkgoip k xaediv qb caiohgqxo kdqah hni ojywlgoh qjivkhgqx, gb hnkh go mnkh gh go, dah gh nko kloq hvguuivip ixcagvgio kdqah hni jivoqxxil vibivixwip gx hnkh eiookui. Qav wqaxhivgxhillguixwi axgh nkti kosip ei hq hkos yqa mghn ixcagvgio kdqah hni xkeio eixhgqxip hnivi, gx jkvhgwalkv: Zioogwk; Mglnile; Xgsqlkao; Hgvjghrabiv. Gh go jqoogdli hnkh hnioi kvi joiapqxyeo qv wqpi xkeio, dah hniy pq xqh kjjikv gx qav viwqvpo kxp WG dvkxwn mqalp di tivy gxhiviohip gx kxyhngxu yqa wkx bgxp qah kdqah hnie gx vilkhgqx hq Xkrg ojy qjivkhgqxo. G bqllqmip aj qx hni OGO vijqvh hnkh Nghliv Yqahn uvqajo hvktillgxu kdvqkp mivi kosip hq wqejlihi k pihkglip caiohgqxxkgvi, wniwsgxu gb Nkvvy nkp lgxso hnkh wqalp nilj mghn hngo, kxp ni oixh ei hni khhkwnip eiookui hnkh mko jnqhquvkjnip dy k DQOO axpivwqtiv qjivkhgti gx Divlgx. Ni hqlp ei hnkh gh nkp diix ifbglhvkhip bvqe Kdminv nikpcakvhivo kxp kjjikvo hq di k vicaioh bqv kjjvqtkl bqv k xim egoogqx, hnqaun xighniv N xqv G nkti nkp hgei hq dviks gh, oq G lqqs bqvmkvp hq viwigtgxu yqav piwvyjho. Mi dilgiti hni eiookui nko diix ixwgjnivip aogxu k siymqvp oadohghahgqx wgjniv kxp ugtix hnkh mi kvi xqh oavi nqm oivgqao hni ojywlgoh hnvikh egunh di mi mqalp di uvkhibal gb yqa wqalp piwgjniv gh cagwsly. Hni eiookui mko kloq k viegxpiv hq ei hnkh qav qmx oiwavghy go kx gejqvhkxh wqxogpivkhgqx, oq G mgll kloq omghwn hq k siymqvp oadohghahgqx wgjniv bqv hni xifh Egoogqx Dvgibgxu. Jikvl. diff --git a/2020/ciphertext.2b.txt b/2020/ciphertext.2b.txt new file mode 100644 index 0000000..3268019 --- /dev/null +++ b/2020/ciphertext.2b.txt @@ -0,0 +1 @@ +AKKHCKUDC N DLI ZUJJUDC KD HZBHE JPZFAKTUJHIJ UC KTH LX HJKABYUJTZHCK UJ SDUCS NHYY AYKTDLST KTH IHWHCK UCWIHAJH UC EUFYDZAKUW KHCJUDC TAJ JUSCURUWACKYP UCWIHAJHE KTH IUJX RDI DLI ASHCKJ UC WDZZLCUWAKUCS NUKT KTHUI TACEYHIJ. NUKT KHYHSIAZ KIARRUW LCEHI HCTACWHE JLFHIMUJUDC BP KTH LX UCKHYYUSHCWH DISACUJAKUDCJ UK UJ AYJD UCWIHAJUCSYP EURRUWLYK RDI KTH ASHCKJ ACE KTHUI TACEYHIJ KD IHFAKIUAKH UCKHYYUSHCWH IHFDIKJ DR ACP JUSCURUWACWH. KTH LJH DR BACXUCS WUFTHIJ UJ CD YDCSHI IHSAIEHE AJ JHWLIH ACE EHJFUKH UKJ DBMUDLJ AEMACKASHJ, KTH HCUSZA UJ KDD MAYLABYH KD LJ KD AYYDN UKJ LJH BHTUCE HCHZP YUCHJ. RDI CDN, NH AIH HCWDLIASUCS DLI ASHCKJ KD LJH A ZUO DR XHPNDIE ACE KIACJFDJUKUDC WUFTHIJ AJ KALSTK UC KTHUI BAJUW KIAUCUCS, JUCWH KTHJH AIH IHYUABYH ACE ED CDK IHGLUIH KTH ASHCKJ KD BH UC FDJJHJJUDC DR ZDIH KTAC A JHIUHJ DR XHP NDIEJ ACE FTIAJHJ, NTUWT KTHP AIH NHYY ABYH KD ZHZDIUJH. AJ KTH GLACKUKP DR JUSCAYJ KIARRUW UCWIHAJHJ NH NUYY CHHE KD IHWDCJUEHI DLI FIDKDWDYJ, BLK RDI CDN U KTUCX DLI RDWLJ JTDLYE BH DC EHMHYDFUCS JHWLIH WDZZLCUWAKUDC WTACCHYJ, NUKT WLK-DLKJ KD UJDYAKH DLI ZDIH MAYLABYH AJJHKJ. U EUJWLJJHE KTUJ UJJLH NUKT ZP WDLCKHIFAIK UC EHFAIKZHCK UT NTD UJ A XHHC WPWYUJK ACE TH ZAEH A IAKTHI UCSHCUDLJ JLSSHJKUDC KTAK NH ZUSTK ZAXH SDDE LJH DR KTH TUKYHI PDLKT. A CLZBHI DR FAIKUHJ TAMH BHHC UCMUKHE KD MUJUK KTH LX DC WPWYUCS KDLIJ ACE TH TAE BHHC WDCJUEHIUCS AJXUCS KTHZ KD IHWDIE UCRDIZAKUDC ABDLK KTH YAPDLK DR ZUYUKAIP ACE UCELJKIUAY YACEZAIXJ AJ FAIK DR TUJ UCKHYYUSHCWH SAKTHIUCS DFHIAKUDC. UK UJ TUSTYP YUXHYP KTAK ACP NAI NUYY UCMDYMH A FIDKIAWKHE BDZBUCS WAZFAUSC ACE LF KD EAKH ZAFJ NUYY BH DR SIHAK MAYLH UC DLI FYACCUCS. RLIKTHIZDIH, KTH WDLCKIPJUEH IDAE YAPDLKJ UC KTH LX AIH CDKDIUDLJ RDI KTHUI UCHRRUWUHCWP ACE ACP UCMAJUDC, NDLYE BH JHMHIHYP TAZFHIHE BP DLI YAWX DR XCDNYHESH DR KIACJFDIK CHKNDIXJ. TH TAE EIARKHE AC AFFAIHCKYP IAKTHI UCCDWLDLJ AIKUWYH RDI KTH CAQU WPWYUJK AJJDWUAKUDC ZASAQUCH NUKT A YUJK DR KTUCSJ KTAK DLI PDLCS WPWYUJKJ ZUSTK RUCE UCKHIHJKUCS: UZFIHJJ DC PDLI ZHZDIP KTH IDAEJ ACE FAKTJ, MUYYASHJ ACE KDNCJ, DLKJKACEUCS WTLIWT KDNHIJ ACE DKTHI YACEZAIXJ JD KTAK PDL NUYY CDK RDISHK KTHZ. ZAXH A CDKH DR KTH CAZHJ, FYAWHJ, IUMHIJ, JHAJ ACE ZDLCKAUCJ. FHITAFJ PDL ZAP BH ABYH KD LKUYUJH KTHJH JDZH KUZH RDI KTH BHCHRUK DR KTH RAKTHIYACE. JTDLYE PDL WDZH KD A BIUESH NTUWT UCKHIHJKJ PDL, HOAZUCH UKJ WDCJKILWKUDC ACE KTH ZAKHIUAYJ LJHE. YHAIC KD ZHAJLIH ACE HJKUZAKH KTH NUEKT DR JKIHAZJ. NAEH KTIDLST RDIEJ JD KTAK PDL NUYY BH ABYH KD RUCE KTHZ UC KTH EAIX. U FIDFDJH KTAK NH WDCJUEHI LJUCS KTHJH AJJHKJ AJ KTH WLK-DLKJ BHKNHHC DLI LCEHIWDMHI ASHCKJ ACE KTHUI TACEYHIJ UC KTH LX ACE DLI WDZZLCUWAKUDCJ CHKNDIX. KTHP AIH IHYAKUMHYP RIHH KD ZDMH AIDLCE KTH WDLCKIP ACE WAC HAJUYP BH KIAUCHE KD LJH EIDF-DRRJ ACE DKTHI JFPWIARK KD AYYDN KTHZ KD WDYYHWK UCKHYYUSHCWH IHFDIKJ ACE FAJJ KTHZ DC. KTH ZAIMHYYDLJ FDJKH IHJKACKH JPJKHZ AYYDNJ LJ KD WDZZLCUWAKH NUKT KTHZ, ACE A JLUKABYH WDEHBDDX NDLYE AYYDN LJ KD KIACJZUK UCJKILWKUDCJ UC FYAUC KHOK NUKT CD IUJX KTAK KTH ZHACUCS WDLYE BH EUJWHICHE BP WDLCKHIUCKHYYUSHCWH DFHIAKUMHJ UC KTH FDJKAY JHIMUWH. U TAMH ACDKTHI KTDLSTK ABDLK TDN NH ZUSTK HOFYDUK KTUJ CHKNDIX RLIKTHI, TDNHMHI U CHHE KD NDIX KTIDLST JDZH ZDIH EHKAUYJ BHRDIH U EUJWLJJ UK NUKT PDL, ACE U NACKHE KD WTHWX KTAK PDL AIH TAFFP RDI ZH KD AYYDWAKH IHJDLIWHJ KD KIAUC A CLZBHI DR TUKYHI PDLKT UC KTH IHGLUIHE JXUYYJ RDI KTUJ DFHIAKUDC. CI. diff --git a/2020/plaintext.2a.txt b/2020/plaintext.2a.txt new file mode 100644 index 0000000..40cad1b --- /dev/null +++ b/2020/plaintext.2a.txt @@ -0,0 +1 @@ +The decrypt of the first mission intercept has raised a number of questions about the spyclist operation, if that is what it is, but it has also triggered enquiries about the personnel referenced in that message. Our counterintelligence unit have asked me to task you with enquiries about the names mentioned there, in particular: Jessica; Wilhelm; Nikolaus; Tirpitzufer. It is possible that these are pseudonyms or code names, but they do not appear in our records and CI branch would be very interested in anything you can find out about them in relation to Nazi spy operations. I followed up on the SIS report that Hitler Youth groups travelling abroad were asked to complete a detailed questionnaire, checking if Harry had links that could help with this, and he sent me the attached message that was photographed by a BOSS undercover operative in Berlin. He told me that it had been exfiltrated from Abwehr headquarters and appears to be a request for approval for a new mission, though neither H nor I have had time to break it, so I look forward to receiving your decrypts. We believe the message has been enciphered using a keyword substitution cipher and given that we are not sure how serious the spyclist threat might be we would be grateful if you could decipher it quickly. The message was also a reminder to me that our own security is an important consideration, so I will also switch to a keyword substitution cipher for the next Mission Briefing. Pearl. diff --git a/2020/plaintext.2b.txt b/2020/plaintext.2b.txt new file mode 100644 index 0000000..7b70558 --- /dev/null +++ b/2020/plaintext.2b.txt @@ -0,0 +1 @@ +attention w our mission to embed sympathisers in the uk establishment is going well although the recent increase in diplomatic tension has significantly increased the risk for our agents in communicating with their handlers. with telegram traffic under enhanced supervision by the uk intelligence organisations it is also increasingly difficult for the agents and their handlers to repatriate intelligence reports of any significance. the use of banking ciphers is no longer regarded as secure and despite its obvious advantages, the enigma is too valuable to us to allow its use behind enemy lines. for now, we are encouraging our agents to use a mix of keyword and transposition ciphers as taught in their basic training, since these are reliable and do not require the agents to be in possession of more than a series of key words and phrases, which they are well able to memorise. as the quantity of signals traffic increases we will need to reconsider our protocols, but for now i think our focus should be on developing secure communication channels, with cut-outs to isolate our more valuable assets. i discussed this issue with my counterpart in department ih who is a keen cyclist and he made a rather ingenious suggestion that we might make good use of the hitler youth. a number of parties have been invited to visit the uk on cycling tours and he had been considering asking them to record information about the layout of military and industrial landmarks as part of his intelligence gathering operation. it is highly likely that any war will involve a protracted bombing campaign and up to date maps will be of great value in our planning. furthermore, the countryside road layouts in the uk are notorious for their inefficiency and any invasion, would be severely hampered by our lack of knowledge of transport networks. he had drafted an apparently rather innocuous article for the nazi cyclist association magazine with a list of things that our young cyclists might find interesting: impress on your memory the roads and paths, villages and towns, outstanding church towers and other landmarks so that you will not forget them. make a note of the names, places, rivers, seas and mountains. perhaps you may be able to utilise these some time for the benefit of the fatherland. should you come to a bridge which interests you, examine its construction and the materials used. learn to measure and estimate the width of streams. wade through fords so that you will be able to find them in the dark. i propose that we consider using these assets as the cut-outs between our undercover agents and their handlers in the uk and our communications network. they are relatively free to move around the country and can easily be trained to use drop-offs and other spycraft to allow them to collect intelligence reports and pass them on. the marvellous poste restante system allows us to communicate with them, and a suitable codebook would allow us to transmit instructions in plain text with no risk that the meaning could be discerned by counterintelligence operatives in the postal service. i have another thought about how we might exploit this network further, however i need to work through some more details before i discuss it with you, and i wanted to check that you are happy for me to allocate resources to train a number of hitler youth in the required skills for this operation. nr.