As a part of our release of the Quadruple
CD set 'The Conet Project',
we are issuing a set of difficult cryptographic challenges in an
attempt to try and further unravel the mystery of Numbers Stations.
What
Numbers Stations send
encrypted text transmissions over shortwave. No one knows for sure
what ciphers are used to encrypt the various transmissions, though
it is widely believed
that 'one time pad' systems are the cipher of choice in the Numbers
operations. If deployed correctly, OTP ciphertext is uncrackable,
no matter how much time or processor power is applied to the problem.
Why
If we can decipher any single
Numbers Station transmission, we will instantly have an insight
into who is behind the particular station, and where it originates
from. We may also be able to glean information on where the recipient
is located. No one (at least no civilian) has ever managed to decrypt
a Numbers Station message. It is clear however, that the NSA
has decrypted these transmissions in the past; see the
Venona Project. The Numbers
Station Crack Challenge is inspired by the RSA
Laboratories Secret Key challenges which are designed to
demonstrate the weakness of short key lengths in commercial cryptography
applications.
How
With the advances in networking
that are available to everyone, an unprecedented amount of processor
power can be rallied to crack mathematical problems. Previously,
only Governments that could afford Cray Supercomputers has access
to this type of computational power, and in the case of Cray the
American Government forbade the export of such machines, effectively
making them unavailable to the rest of the world. Now with client
based network cracking, almost any brute force cryptanalytic attack
can be mounted with a more than reasonable chance of quick success.
Spectacular cracks have already been successfully mounted on problems
that seemed insurmountable only a few years ago. This can
be done, the problem is, how can it be done? You are
free to use any methods that you can devise, using whatever you
have at your disposal. The competition is open to individuals and
groups. Any solution to one of the five challenges must be accompanied
by a complete description of how the crack was done (a mathematical
proof) together with any software that was written to get the job
done. This is needed because we do not have the original plaintext
at our disposal to check against any submitted solution.
Where
The Numbers Station Crack
Challenge comes in five parts. Each part is a cyphertext
transcribed directly off air from a recent transmission from one
of of five different and currently active Numbers Stations. The
stations are:
- E3
(The Lincolnshire Poacher)
- E5
(CIA Counting Station)
- E22
(New Station!)
- E10
(Phonetic Alphabet Station)
- G2
(The Swedish Rhapsody)
When
The challenge begins now, and
there is no time limit.
Who
This competition is
open to everyone. We prefer our email to be
PGP encrypted.
Challenge HQ can be reached at irdial [at] irdial [dot] com.
Here is our PGP Public Key:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 6.5.2 for non-commercial use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=mIFD
-----END PGP PUBLIC KEY BLOCK-----
Back to The CONET Project home page.
000 000 |