Skip to content

SHA Mystery Cache

This cache has been archived.

Peeruleek: Archiving.

More
Hidden : 10/7/2020
Difficulty:
5 out of 5
Terrain:
4.5 out of 5

Size: Size:   small (small)

Join now to view geocache location details. It's free!

Watch

How Geocaching Works

Please note Use of geocaching.com services is subject to the terms and conditions in our disclaimer.

Geocache Description:


[EST]

Secure Hash Algorithm ehk SHA on krüptograafiliste räsifunktsioonide perekond, mis arendati välja Ameerika Ühendriikide Riiklikus Standardite ja Tehnoloogia Instituudis koostöös Riikliku julgeolekuagentuuriga.

SHA algoritmide perekonda kuuluvad SHA-0, SHA-1, SHA-2 ja SHA-3.

SHA-0 algoritmi esialgne nimi oli lihtsalt SHA, aga hiljem lisandus uuemaid sarnase põhimõttega algoritme, mistõttu võeti kasutusele nimi SHA-0. Aastal 1993 avaldati SHA-1, mis oli esialgse algoritmi edasiarendus. Uues algoritmis oli parandatud varem leitud turvaauk, kusjuures SHA-0 ja SHA-1 erinevad ainult ühe tehte võrra. Praeguseks on SHA-1 algoritm kuulutatud ebaturvaliseks ning NIST soovitab riigiorganisatsioonidel kasutada uuemaid SHA räsifunktsioone.

SHA-2 perekonda kuuluvad räsifunktsioonid SHA-256 ja SHA-512. SHA-256 kasutab 32-bitiseid sõnu ning SHA-512 64-bitiseid sõnu.

SHA-3 loodi Riikliku Standardite ja Tehnoloogia Instituudi poolt peetud avaliku konkursi käigus. Konkursi komisjoni poolt väljavalituks osutunud räsialgoritmi Keccak loojateks on Guido Bertoni, Joan Daemen, Michaël Peeters ja Gilles Van Assche. SHA-3 loomise eesmärgiks ei olnud SHA-2 välja vahetamine, vaid pakkuda sellele alternatiivi juhul kui SHA-2 algoritmis avastatakse turvaauke.
SHA-3 perekonda kuuluvad laiendatava väljundiga räsifunktsioonid (ingl extendable-output function, XOF) SHAKE128 ja SHAKE256, mille väljundi suurust on vabalt muudetav. SHAKE-funktsioonid on esimesed Riikliku Standardite ja Tehnoloogia Instituudi poolt standardiseeritud XOF funktsioonid.

Aarde leidmiseks tuleb teil teada, millise koordinaadi põhja- ja idapikkuse kraadist on loodud järgnev SHA256 räsi:

8c9204c0c8d8fdde878f90df7eb22259d599621fe916666919f6f44c5e3195d1

Leitava räsi tekst on kujul: ???? HDD MM.mmm HDDD MM.mmm

???? seejuures on 1 kuni 4 tähemärgi pikkune suvaline tekst, mis võib koosneda tähtedest [A-Z] ja numbitest [0-9].

Näiteks:
AA N59 20.100 E024 44.910 SHA256 räsi on 220a5e7a938da10042ad2608015f9a0b822d4556d9c6ee3af3eb412695cb4ca8
AB12 N59 20.100 E024 44.910 SHA256 räsi on fd915b903e067b6e48a5842b99164d06cad88d666eb8fa0a5e41a150fc08c38d

[ENG]

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including:

SHA-0: A retronym applied to the original version of the 160-bit hash function published in 1993 under the name "SHA". It was withdrawn shortly after publication due to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.

SHA-1: A 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the National Security Agency (NSA) to be part of the Digital Signature Algorithm. Cryptographic weaknesses were discovered in SHA-1, and the standard was no longer approved for most cryptographic uses after 2010.

SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-byte words where SHA-512 uses 64-byte words. There are also truncated versions of each standard, known as SHA-224, SHA-384, SHA-512/224 and SHA-512/256. These were also designed by the NSA.

SHA-3: A hash function formerly called Keccak, chosen in 2012 after a public competition among non-NSA designers. It supports the same hash lengths as SHA-2, and its internal structure differs significantly from the rest of the SHA family.

The corresponding standards are FIPS PUB 180 (original SHA), FIPS PUB 180-1 (SHA-1), FIPS PUB 180-2 (SHA-1, SHA-256, SHA-384, and SHA-512). NIST has updated Draft FIPS Publication 202, SHA-3 Standard separate from the Secure Hash Standard (SHS).

To find this cache you have to know, from which coordinate´s northern and eastern degree has been made next SHA256 hash:

8c9204c0c8d8fdde878f90df7eb22259d599621fe916666919f6f44c5e3195d1

Format for needed hash text: ???? HDD MM.mmm HDDD MM.mmm

???? is random text of 1 to 4 chracters consisting of the letters [A-Z] and the numbers [0-9].

For example:
AA N59 20.100 E024 44.910 SHA256 hash is 220a5e7a938da10042ad2608015f9a0b822d4556d9c6ee3af3eb412695cb4ca8
AB12 N59 20.100 E024 44.910 SHA256 hash is fd915b903e067b6e48a5842b99164d06cad88d666eb8fa0a5e41a150fc08c38d

Additional Hints (Decrypt)

[A-Z], abg [a-z]

Decryption Key

A|B|C|D|E|F|G|H|I|J|K|L|M
-------------------------
N|O|P|Q|R|S|T|U|V|W|X|Y|Z

(letter above equals below, and vice versa)