Timeline for Count characters, turn them into a cipher
Current License: CC BY-SA 3.0
22 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Mar 2, 2014 at 12:38 | comment | added | Mike Edward Moras |
Bonus points (-30) for making a decryptor (no copying the decryption list, do it from scratch? THAT’S IMPOSSIBLE! You would need to have the key (your "decryption list" aka "lookup table") to be able to do that. Just taking a ciphertext and expecting anyone to provide a decryptor that transforms it back into plaintext without the use of any key is as if you’re asking us to post a question to StackOverflow without typing any letters or numbers. Information theory already tells us that you can’t gain information out of nowhere... so your substitution cipher needs that lookup table (aka key).
|
|
| Feb 28, 2014 at 23:20 | vote | accept | TheDoctor | ||
| Feb 25, 2014 at 11:06 | answer | added | Rajesh | timeline score: 0 | |
| Feb 21, 2014 at 19:06 | answer | added | user2846289 | timeline score: 0 | |
| Feb 20, 2014 at 21:39 | history | edited | TheDoctor | CC BY-SA 3.0 |
added 6 characters in body
|
| Feb 20, 2014 at 20:33 | answer | added | camelthemammel | timeline score: 0 | |
| Feb 20, 2014 at 20:02 | answer | added | PauloHDSousa | timeline score: 1 | |
| Feb 20, 2014 at 16:05 | answer | added | Daniel Janus | timeline score: 0 | |
| Feb 20, 2014 at 16:00 | answer | added | blabla999 | timeline score: 0 | |
| Feb 20, 2014 at 13:48 | comment | added | TheDoctor | @DigitalTrauma - let's say 30 points for a decryptor | |
| Feb 20, 2014 at 13:40 | history | tweeted | twitter.com/#!/StackCodeGolf/status/436495549903421440 | ||
| Feb 20, 2014 at 13:08 | answer | added | Sven Hohenstein | timeline score: 0 | |
| Feb 20, 2014 at 11:53 | answer | added | Decent Dabbler | timeline score: 0 | |
| Feb 20, 2014 at 11:26 | answer | added | tmartin | timeline score: 1 | |
| Feb 20, 2014 at 10:15 | comment | added | Eliseo D'Annunzio | @TheDoctor great idea, but you have made one little error... the ciphered text should start with the respective ciphered letters according to your algorithm! :) First sentence starts with M now, second sentence with P and so on... | |
| Feb 20, 2014 at 10:12 | answer | added | David Herrmann | timeline score: 2 | |
| Feb 20, 2014 at 7:51 | answer | added | Howard | timeline score: 3 | |
| Feb 20, 2014 at 4:31 | answer | added | DavidC | timeline score: 1 | |
| Feb 20, 2014 at 4:21 | comment | added | Jonathan Van Matre | This is a fun challenge, but the encryption method here would make a cryptographer weep. Not only is it a single-substitution cipher, but it has the audacity to introduce a recognizable and exploitable bias: the more common a ciphertext letter is in usage of the enciphered language, the more likely the plaintext lies near the beginning of the alphabet. It out-Caesar's Caesar. ;-) | |
| Feb 20, 2014 at 3:45 | comment | added | Digital Trauma | How many points for a decryptor? | |
| Feb 20, 2014 at 2:32 | answer | added | Digital Trauma | timeline score: 3 | |
| Feb 20, 2014 at 2:08 | history | asked | TheDoctor | CC BY-SA 3.0 |