| --==[[BKAChat v0.0.2]]==-- |
| |
| >> Connecting to blowingthewhistle.bka.de ... |
| >> Secured connection established! (Using DES) |
| |
| "Welcome to the BKAs whistleblower channel, you may speak now. We're listening!" |
| |
| <anonymous>: I have some important information for you regarding the safety of a small Thuringian town! |
| <bka>: So? What information? |
| <anonymous>: A yet unknown terrorist group is planning to destroy Ilmenau! |
| <bka>: And how would you know? |
| <anonymous>: You have to trust me... I have evidence! |
| <bka>: Ok... and what is you evidence? |
| <anonymous>: I intercepted an encrypted message. I'll send it to you. |
| |
| [DATA TRANSMISSION STARTED] |
| .............. |
| [DATA TRANSMISSION FINISHED SUCCESSFULLY] |
| |
| <bka>: Well, that looks like any other arbitrary message to me, we have no time to waste on poking around in the dark! |
| <anonymous>: They are using a completely new encryption method, I'll send you the schematics. |
| |
| [DATA TRANSMISSION STARTED] |
| .............. |
| [DATA TRANSMISSION FINISHED SUCCESSFULLY] |
| |
| <bka>: Mhhh, let me hand this to our chief-cryptographer. |
| <bka>: Please be patient, this may take a little while. |
| <bka>: ... |
| <bka>: ... |
| <bka>: Ok, so as far as we can say right now, the encryption method is very hard to break! |
| <bka>: The encryption process takes 1000 rounds! To successfully decrypt the message without knowing the private key one has to bruteforce the temporary key of every round. But we found a flaw in the algorithm that makes it possible to just use a key below a certain threshold, nevertheless it takes quite some time and computing power to find that key! |
| <anonymous>: If computing power is an issue for you, you might want to consider contacting the local Geocacher community, they seem to have lots of top-notch technology! |
| <bka>: Mh, we'll think about that. |
| <bka>: Thanks for your help! Goodbye. |
| |
| >> Connection closed. |