Op bovenstaand coördinaat is geen cache te vinden. Wel kun je er natte voeten halen.
Blaise de Vigenère was a French man born in Saint-Pourçain-sur-Sioule on April 5 1523. Vigenère has made several contributions to cyptography, but the cipher that bears his name is not one of them.
In 1586 Vigenère published the book "Traicté des Chiffres ou Secrètes Manières d'Escrire", where he, amongst other items, describes two types of autokey ciphers. One of the ciphers use the encrypted text as a key, the other one the decrypted message. To get the encryption and decryption started, he proposed using a single letter. In kombination with ten secret alphabets this was probably resonably safe for its time. However, if the alphabets are known there would only be 26 possible keys in e.g. English which makes the whole scheme as weak as a simple caesar type shift cipher.
Warmup
The current version of Vigenères autokey uses a tabula recta based on a standard alphabet (a-z in order) with a message key longer than one character (possibly much longer). Since the code table is fully known, the crypto would be easily broken if guessing a plausible piece of clear text and the length of the message key correctly. For more details see Wikipedia.
Modifications
To strengthen the cipher system you can use non standard alphabets, as Vigenère did himself. As I could not find any reliable information on how he used his secret alphabets I created a variation of the modern autokey cipher using a none standard code alphabet.
The details on how to use and break this cipher follows below.
Exercises
The exercices are only available in English as there would be a lot of text to translate.
Encryption
How to encrypt a number using the digits as the alhabet:
- Base alphabet: 0123456789
- Coding alphabet: 2718459036
- Message key: 314
- Message: 473893812220887
Code table:
. 0123456789
0 2718459036
1 7184590362
2 1845903627
3 8459036271
4 4590362718
5 5903627184
6 9036271845
7 0362718459
8 3627184590
9 6271845903
The top row is the clear text, the left column is the key and the character inside the table is the encryption. Notice that there is a symmetry in that code and clear text are interchangeable.
Ecnrypting the text:
473833812220887 message
314473893812220 key (message key followed by message)
030119925281220 encrypted text
Breaking the cipher
To break this cipher you will need to know:
- The encrypted message.
- The basic alphabet.
- A fairly long crib (known piece of plain text).
The crib must be long enough to ecnrypt itself at least partially, i.e. longer than the message key. The crib may have unknown letters inside itself, as long as at least some letters overlap.
The message we are going to break is
tcmqebfgwsixyfwynzvxwrdqaxvbivngufzxryjshhsexyflcqqfhsrjxroprmenwynxzvxwrywryxyeryqlsgufzxrykvetljldehqfhs
and we know it encodes a geocache coordinate in the vincinity of Ryd, Linköping.
Through some incredible luck, or after trying many other options, this is a promosing step in cracking the message, with a message key lenght of three:
northfiveeight............................................................................................
...northfiveeight.........................................................................................
tcmqebfgwsixyfwynzvxwrdqaxvbivngufzxryjshhsexyflcqqfhsrjxroprmenwynxzvxwrywryxyeryqlsgufzxrykvetljldehqfhs
From this we can reconstruct part of the decoding table and fill in the diagonals:
. abcdefghijklmnopqrstuvwxyz abcdefghijklmnopqrstuvwxyz
a .......................... .fgi..q..wxys........eb...
b .......................... fgi..q..wxys........eb....
c .......................... gi..q..wxys........eb....f
d .......................... i..q..wxys........eb....fg
e ......xy.................. ..q..wxys........eb....fgi
f ....w..................... .q..wxys........eb....fgi.
g .......................... q..wxys........eb....fgi..
h .....................g.... ..wxys........eb....fgi..q
i ....s..............f...... .wxys........eb....fgi..q.
j .......................... wxys........eb....fgi..q..
k .......................... xys........eb....fgi..q..w
l .......................... ys........eb....fgi..q..wx
m .......................... s........eb....fgi..q..wxy
n ...................q...... ........eb....fgi..q..wxys
o .......e.................. .......eb....fgi..q..wxys.
p .......................... ......eb....fgi..q..wxys..
q .......................... .....eb....fgi..q..wxys...
r .....b.................... ....eb....fgi..q..wxys....
s .......................... ...eb....fgi..q..wxys.....
t ........f................. ..eb....fgi..q..wxys......
u .......................... .eb....fgi..q..wxys.......
v ........i................. eb....fgi..q..wxys........
w .......................... b....fgi..q..wxys........e
x .......................... ....fgi..q..wxys........eb
y .......................... ...fgi..q..wxys........eb.
z .......................... ..fgi..q..wxys........eb..
With the partial table above we can decode a few more characters, remember that the key is the decrypted text shifted three steps. New characters are highlighted as capitals:
northfiveeightDE..........................................................................................
...northfiveeightDE.......................................................................................
tcmqebfgwsixyfwynzvxwrdqaxvbivngufzxryjshhsexyflcqqfhsrjxroprmenwynxzvxwrywryxyeryqlsgufzxrykvetljldehqfhs
Just two new characters, DE, but a probable guess here would be DEGREES, so fill in that:
northfiveeightDEGREES.....................................................................................
...northfiveeightDEGREES..................................................................................
tcmqebfgwsixyfwynzvxwrdqaxvbivngufzxryjshhsexyflcqqfhsrjxroprmenwynxzvxwrywryxyeryqlsgufzxrykvetljldehqfhs
Use these new characters to fill in more of the coding table:
. abcdefghijklmnopqrstuvwxyz
a .fgi..q.Vwxys.......Zeb..N
b fgi..q.Vwxys.......Zeb..N.
c gi..q.Vwxys.......Zeb..N.f
d i..q.Vwxys.......Zeb..N.fg
e ..q.Vwxys.......Zeb..N.fgi
f .q.Vwxys.......Zeb..N.fgi.
g q.Vwxys.......Zeb..N.fgi..
h .Vwxys.......Zeb..N.fgi..q
i Vwxys.......Zeb..N.fgi..q.
j wxys.......Zeb..N.fgi..q.V
k xys.......Zeb..N.fgi..q.Vw
l ys.......Zeb..N.fgi..q.Vwx
m s.......Zeb..N.fgi..q.Vwxy
n .......Zeb..N.fgi..q.Vwxys
o ......Zeb..N.fgi..q.Vwxys.
p .....Zeb..N.fgi..q.Vwxys..
q ....Zeb..N.fgi..q.Vwxys...
r ...Zeb..N.fgi..q.Vwxys....
s ..Zeb..N.fgi..q.Vwxys.....
t .Zeb..N.fgi..q.Vwxys......
u Zeb..N.fgi..q.Vwxys.......
v eb..N.fgi..q.Vwxys.......Z
w b..N.fgi..q.Vwxys.......Ze
x ..N.fgi..q.Vwxys.......Zeb
y .N.fgi..q.Vwxys.......Zeb.
z N.fgi..q.Vwxys.......Zeb..
Use this table to decode some more characters in the message, notice how we get a "runaway" effect deoding a few extra characters:
northfiveeightdegrees..O..U..O............................................................................
...northfiveeightdegrees..O..U..O.........................................................................
tcmqebfgwsixyfwynzvxwrdqaxvbivngufzxryjshhsexyflcqqfhsrjxroprmenwynxzvxwrywryxyeryqlsgufzxrykvetljldehqfhs
The cache is probably at N 58 24 or N 58 25, so we fill in TWOFOUR, fill up more of the decoding table and the new message is:
northfiveeightdegreestwofourpoin.th.ee.i..e..h............................................................
...northfiveeightdegreestwofourpoin.th.ee.i..e..h.........................................................
tcmqebfgwsixyfwynzvxwrdqaxvbivngufzxryjshhsexyflcqqfhsrjxroprmenwynxzvxwrywryxyeryqlsgufzxrykvetljldehqfhs
At this point you may see more or less of a pattern, let's just add a "t" for "point" and see where it gets us:
northfiveeightdegreestwofourpoinTthRee.i..e..h............................................................
...northfiveeightdegreestwofourpoinTthRee.i..e..h.........................................................
tcmqebfgwsixyfwynzvxwrdqaxvbivngufzxryjshhsexyflcqqfhsrjxroprmenwynxzvxwrywryxyeryqlsgufzxrykvetljldehqfhs
Continue like this, guessing or revealing more and more of the text, the new guess is in capitals:
northfiveeightdegreestwofourpointthreeNiNEeIGhT..n..e..a..................................................
northfiveeightdegreestwofourpointthreenineeightMInUTeSeast..e..v..e..e..t..e..h..e..i..t..e..e..o..m..u..s
northfiveeightdegreestwofourpointthreenineeightminuteseastONeFIvEdegreesthreethreepointthree.er.on.mi.ut.s
northfiveeightdegreestwofourpointthreenineeightminuteseastonefivedegreesthreethreepointthree.eroonemiNutEs
Towards the end the decoding table will be full enough to decode most of the message.
"north five eight degrees two four point three nine eight minutes east one five degrees three three point three zero one minutes" also known as "N 58 24.398 E 15 33.301"
Your task
To find the cache, you need to break the encrypted message below.
Intercepted message
qeydv ehqbu qesvu sbudd daekj ecbsa tauga lpklo gzmll wqqtp dveuz
wlsyq uyqvc llpmy vspxq clxbv nbifb xcjxp ekikl tdlnt igzmi hjxiz
xibqv tjpsy spjmy pgfkv euwoc xqclk je
Clues
Two words of the clear text are known:
Cache location
The message will not reveal the correct coordinates, so you need to use the checker to obtain the correct coordinates:
