[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]


    Search the Q&A Archives


Dear All, I have a problem. I would like to know if is...

<< Back to: Cryptography FAQ (01/10: Overview)

Question by Gaia
Submitted on 1/15/2004
Related FAQ: Cryptography FAQ (01/10: Overview)
Rating: Rate this question: Vote
Dear All,
I have a problem. I would like to know if is possible to decipher the following english text.
Many thanks.

42HtpvX'; SolnP:M6LF2cKNWJEe71qm8î7î|wû%Z!R4ó~I+áQãM©e±W¹,q )?ö`ØSî{v$ù_2ïà:^A(É[æ2Â0û|<àâyÄC`]îÌJ?kßV~NçCÄò>óé&R§8@:¢(!'rÇE`[îµMÀ83+/!Wæü)í&¥º%|C.éêV'H.ÿìíI(FVæ(ZMû+8*ùS)R>áÎ:é}éë3ß@éX(`y!F=L^ç;R=<'1ÐTX[T±dYp70`CDG:EZKZ]Ä,ÙçFW/<ì@§@Í%X+ íx9x`,sILE¼
îÿ.ìú´+&XÅxÊïó+âMÉáë#Çyíp$,äíB^@%1À[K;_ÊLæ|)óyË)H²ï ¥>ü#V3ã'z',{ª3^2æ,=LäTò(=<:1ã)Íiåú ¢àu,IßCèÿS/K(]Fzû
óÿå6,3£}J5;|5óoîGçMëoîP}mLobí)1îWüòúµ+ÎR»x~~>è,[áWÂ0;¥}!,pÿC`<,#Yâ,¥>ü#V3ã'z'9{Twv'æ4=@ßÎBû*CùqcìÍ*ä%mP0ã]J'ZJùò#Hæ]è2ÙVJWX&2@TºúX%%4ò'
î¹æÙqæY²êßæ|@>Qà[ªVëwÎ¥4éì:ì?(`ï4îîg´5_1ï .±F@É¥>ü#V3ã'z''{ú3ÛAæJw_+C(FÓEp@íVTÖ!ö0Y$,t`8 {¾9Û3
îìæ(úã7²ãH;.|zéÅöH§ 7)|ïà$ ì@y~èÿ$ùú¹+<Lå;Ê?H+Ús%!ë¥>ü#V3ã'z'2{P +2úF@2ÙRDWñ<Br+FßóÔúrOìïu`àrIZEZ¢KFwDã
ïZªÇú!.²ßI ,~vè8Tãáè#ôCÑà rÏìÅÏóÿ#ë,O;.ô/wÊ}D+ëöúW{ Îö'! IÿDç`ÈéTÀè8+X X;7îI+~öÉñö ä|[C$à¢í¥º%#+xãòIE5E&[]KÃòtûߣUI=2*'+ºçZ>N G${w`C6JB[^Kç1=@))(û£Aï1§CÍ=>jr¢{yëIÇzCC[=&ãF=©^ÈERí<à@e&
Ø%î+qû$3!,;ä¾@GËóK§ì#bG]BìyÏèÅ?'ÿüÇ?3£@0/;Êíóâ&[êUëbêá¹nnàé?&1Ú4îÄ;$NÍMßeÄì>:ù[ú§Â4ñá§IAÆ,SÅ<òêQÀ9$£+Nßqû~>è,ÄLê42:áì!'òîy`<î§Tap%+¼j%#,xãòK'z{PEÛüæ/p@^£SW*s*é/S*[¢%w¢é0êGgDìÿ&åPLF1L^£# ï5*ÇS)(Öã%#Sl7:`64{WEÿyª,B0[G(FÓEp@åSZ[çÎ4Y$òt`4vJB@êLæ](3}ò( =r~rÐUY[åÎ8Y${f
%N_eûß'ôüeá5>,É(Pã& )|{à|rÏìE^îÿÅ6[K?;$æ:!Öó+8GÉ+î ì|?à$Vÿ.J³`9æ9úêQ_JßwÊÕH+»HãWÂ8ûä8!.o¢öü`Àï/#óì 3Iw?£.RæK~F._?J¥UVA7-ïKÍjá%t¢@k:'ßì:ÿÉæMæì3Hó£Q;*AàuÐT${T§nYxã'I[y{P0^KÅ0ù,ÙSIWSâo@ź-
È.3À]X£?!¼sÄé>í&àSÆ} Î8}ZxééäÅÐ'ÿ#ù,à+7#Zæ«~ÄtËòT!ë¥>ü#V3ã'z,GEX[]2ÙF=W^#&QYàp@Sºªã>T7Y$^3Iz?¢G[~,ç,B'
/%KÀ65£?3ï6:îuÇÉ[7VÂ9û|ñàâyÄC`]î§NÓg$V=!ï5ù`u&/[²1Â;ûí;;nùÿ¥>ü#V3ã'z'tNABåEJòB«XQùWª<àzÐäZ[åú ¢'g]I8y{T.`èÃJtX^£§DÓâùò
öÿª&ú§Q_PåzÊ£óMé&N*î ,ZìàRòá?äèÈ!IÇnû!:!L4ì~B+ës]VëhÄU}B$;ÿ?/8Ø%îüA$U*Vñiâ6í&ËSV§@#¥C}w$,:í4`öÿª&ú§Q_2ï^7?x&í[%Iå κ4!,DÏåų}Zî[gµ+²úS8Ä[yí:öVÆ_dûy^mìlúKÅìȹYÀé$£+XÅkÊ?Jûé&N!ë#+áúiMoÿC`[6{SÀ N+;ôü;Ê?K+ázãNÉoÎ)}&x:ÿ?ä1ë*êâ'$¥>ü#V3ã'z'6ABAíK(]ìH<ò¥O=ùpù+ºæü-%#Xr:y`E1{S5`èÃJtX^£§DÓâùéó)äÖ^V4&$7s`9Dÿà[[èæ,=L)ú(û^2ùyæEÍ<X± ¢@gò7'zDX[-,#xBèÙÁàU=ìs-æP$)_)7Y$'q` ïûAàêKRù3EäTòWñ<BnÇ)ióÔúyYpùtF'?G&[]K]0=@áZJû]sN@ÐWäÖ%ó è$ q»lù3X0>KÃò3D)((ûâ2ùn+èßí!Q §ì
ûS#&úç+²çIæ},>;ü[]VÂ6û¢7!:DÿK`-óÿ²Ç4KÁ.ôçrÊ|IûÉ[úQÂ3äá8,ì:ì?(`ÅL.Çú#R_Lªm}2óFËÅL§&#ÄM=mòò¥>U#U4ãEI9v{Q9ÛDL]:Hmò¥SñApMTÁáÖô)#í7é1`H4EFEê|ñF=@ä¾àWSPùÿWºª[h)0Y$6kIw?N:EñB)]ù;Ùª&Q=&t
}4îîg´=*!ï[:^w+|JãQ{ Îä8èì òùU`.úX?;$U²#ß67íó+±s9O]tûF=uìpôI`Îíÿ?ì'$¥>U#U4ãEI9v{Q9ÛDL]:Hmò¥SñA7-dì§[Ô± ¹nGgûu?CX[]6ú.:HÙPGPW¢ -ëJ$óãä è$
È<N_i-+²³Væ|'óKËí1$ë#ªS¹8ì%©EÅéÈ<JÇg§Q_Våw`~>é'öP+ë2ìó.àk,ÿ)K`óÿÅ6,LæYôåyÊ?u&/[³MÇ îF¹ HòíùP`àÿªÇ5Xã4ôáiÄò>ó8TãÆ]uΪì!Åkªvá`ÛYî|qª6*Wï[ó¾ÄxÚöÉÁë]ìó.àk,ÿ?&ùÈÀSÀ8%¥>U#U4ãEI9v{Q9ÛDL]:Hmò¥SñAl@)º-Å>)#Ou^:`CrXXà/|üFë3ÙQù(=¢z@(T(Ö$%#Ux'sIr?@X[l.å,=L)¾(û$o}@%&Í%/%iíìãò;' {REÛGLB4HöPCWñ<:@êKÍÉ/Î9YIvéIßçJ*s£2æ4=DXçDû-rù5ÐU$Ö§N<Mìz
sHI4a.y0ijk,rwXVTNa,jgfwdrx.sZyÈ<N_i-+²³Væ|'óKËí1$ë#ªS¹8ì%©EÅéÈ<JÇg§Q_Våw`~>é'öP+ë2ìó.àk,ÿ)K`óÿÅ6,LæYôåyÊ?u&/[³MÇ îF¹ HòíùP`àÿªÇ5Xã4ôáiÄò>ó8TãÆ]uΪì!Åkªvá`ÛYî|qª6*Wï[ó¾ÄxÚöÉÁë]ìó.àk,ÿ?&ùÈÀSÀ8%¥>U#U4ãEI9v{Q9ÛDL]:Hmò¥SñAl@)º-Å>)#Ou^:`CrXXà/|üFë3ÙQù(=¢z@(T(Ö$%#Ux'sIr?@X[l.å,=L)¾(û$o}@%&Í%/%iíìãò;' {REÛGLB4HöPCWñ<:@êKÍÉ/Î9YIvéIßçJ*s£2æ4=DXçDû-rù5ÐU$Ö§N<Mìz



Answer by achakravarty
Submitted on 5/13/2004
Rating: Not yet rated Rate this answer: Vote
Yes.  It is possible.  Especially if it's in English.  Even if the encrypted text is in a form that is difficult to decrypt, it is limited to the character forms that is specified.  By mentioning that it is English makes it all the more easy.  As there are only 26 letters in the English language (52 if you count upper/lower case and up to 60 if you include punctuation), pattern matching could easily determine the cipher based on the most frequently used letters in the English language.  Added to that are sets of powerful dictionary-based pattern matchers that can sort ciphers quickly.  Lastly, if there is some form of numeric hash (unless it is randomized) there will be no problem in determining the basic cipher.  If there are multiple ciphers for various parts of the text, the pattern matching programs would be able to detect and extract the data accordingly.  It already seems that specific lines are cut off (denoting line feeds or returns) making it all the more easier.

I'd start with finding an organization that gets paid to do the deciphering for you (unless you are an expert at it) and see what kind of encryption technique might have been used.

 

Your answer will be published for anyone to see and rate.  Your answer will not be displayed immediately.  If you'd like to get expert points and benefit from positive ratings, please create a new account or login into an existing account below.


Your name or nickname:
If you'd like to create a new account or access your existing account, put in your password here:
Your answer:

FAQS.ORG reserves the right to edit your answer as to improve its clarity.  By submitting your answer you authorize FAQS.ORG to publish your answer on the WWW without any restrictions. You agree to hold harmless and indemnify FAQS.ORG against any claims, costs, or damages resulting from publishing your answer.

 

FAQS.ORG makes no guarantees as to the accuracy of the posts. Each post is the personal opinion of the poster. These posts are not intended to substitute for medical, tax, legal, investment, accounting, or other professional advice. FAQS.ORG does not endorse any opinion or any product or service mentioned mentioned in these posts.

 

<< Back to: Cryptography FAQ (01/10: Overview)


[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]

© 2008 FAQS.ORG. All rights reserved.