Code: Select all
00000001
01001001
10100111
11000010
00010110
11010000
00110101
00000100
Code: Select all
00000001
01001001
10100111
11000010
00010110
11010000
00110101
00000100
You know what sort of encryption they're using?spartan64 wrote:I'm having a go at writing up a program in java which could speed us up in the encryption.
I mean decoding not encryptionScott wrote:You know what sort of encryption they're using?spartan64 wrote:I'm having a go at writing up a program in java which could speed us up in the encryption.
Do you think you can still contact him?Scott wrote:Too bad Aro isn't around anymore. I think he's out making a career for himself or something![]()
I don't have any cryptography experience so I'm probably useless. We need math nerds.
...I probably shouldn't. So, no.spartan64 wrote:Do you think you can still contact him?Scott wrote:Too bad Aro isn't around anymore. I think he's out making a career for himself or something![]()
I don't have any cryptography experience so I'm probably useless. We need math nerds.
You need to switch your EOT with SOH. 00000001 is SOH and 00000100 is EOT. Also, John(Spark's twitter guy and CTO) said that the first hint(this whole series of binary codes) would be complete when an EOT was received. This is the whole first hint. He also said it was encrypted so simply converting it from one format to another will not work. I believe it's been salted.AllenMR wrote:well heres a full writedown of wat we got right now, its nothing special and probably all of you have tipped this down by now, so after we got a couple of more codes it will be easier for us to decrypt a word, although i have been brainstorming on a twitt they did a while back were they explained a guy the process of a conversion and compilation as i believed, but i could be wrong...
Bin: Hex: char: Desc:
00000001 4 eot (End of transmission)
01001001 35 5
10100111 d0 Ð
11000010 16 so (Shift Out)
00010110 c2 Â
11010000 a7 §
00110101 49 i
00000100 1 soh (Start of heading)