12/22/2023 0 Comments Ab cipher decoderI strongly urge you to investigate another alternative for achieving your goal instead of trying every single key. That being said, say you find an optimized way to iterate over the combinations where you can generate and compare a trillion (10^12) combinations per second ( much faster than your average developer's machine), and you can parallelize it across a million machines - that would be (60*60*24*365*10^12)*10^6 per year, or about 3*10^25 combinations checked per year.Īt that blazing speed, it would still take ~190 billion years to go over all combinations. There are around 6*10^36 possible combinations you'll need to iterate through - the largest long value is about 9*10^18 - a much smaller number. If anyone has or knows the code for how to do this, or could help guide met through the steps necessary to code this, it would be much appreciated. (hopefully you can see the pattern there) The key creation progression would go something like this: Each time a new key is generated, the key is being checked with a separate method, and the method stops when the correct key is found. Once the last letter had gone through all 26 possible positions, the second to last letter would be rotated, and then the last letter and the second to last letter would rotate accordingly, and so on a so forth (all the way back to the first letter of the key). If they key was incorrect, then the letter in the last position would be rotated to the next letter in the alphabet. For each key length (anywhere from 1-26), the key would be filled with the letter 'a', and then the program would check to see if they key was corrent (I have another method for that). The keys would contain the letters of the English alphabet and are NOT case sensitive. The program would systematically generate potential keys, with a length starting at 1 and ending at 26. I have an idea of how to go about doing it, but I'm not sure how to code it. Where I am getting stuck is breaking the message (without the key). I am trying to develop a program that encodes, decodes, and breaks the encryption for a message encoded with a Vigenere cipher.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |