--==[[BKAChat v0.0.2]]==-- |
|
>> Connecting to blowingthewhistle.bka.de ... |
>> Secured connection established! (Using DES) |
|
"Welcome to the BKAs whistleblower channel, you may speak now. We're listening!" |
|
<anonymous>: I have some important information for you regarding the safety of a small Thuringian town! |
<bka>: So? What information? |
<anonymous>: A yet unknown terrorist group is planning to destroy Ilmenau! |
<bka>: And how would you know? |
<anonymous>: You have to trust me... I have evidence! |
<bka>: Ok... and what is you evidence? |
<anonymous>: I intercepted an encrypted message. I'll send it to you. |
|
[DATA TRANSMISSION STARTED] |
.............. |
[DATA TRANSMISSION FINISHED SUCCESSFULLY] |
|
<bka>: Well, that looks like any other arbitrary message to me, we have no time to waste on poking around in the dark! |
<anonymous>: They are using a completely new encryption method, I'll send you the schematics. |
|
[DATA TRANSMISSION STARTED] |
.............. |
[DATA TRANSMISSION FINISHED SUCCESSFULLY] |
|
<bka>: Mhhh, let me hand this to our chief-cryptographer. |
<bka>: Please be patient, this may take a little while. |
<bka>: ... |
<bka>: ... |
<bka>: Ok, so as far as we can say right now, the encryption method is very hard to break! |
<bka>: The encryption process takes 1000 rounds! To successfully decrypt the message without knowing the private key one has to bruteforce the temporary key of every round. But we found a flaw in the algorithm that makes it possible to just use a key below a certain threshold, nevertheless it takes quite some time and computing power to find that key! |
<anonymous>: If computing power is an issue for you, you might want to consider contacting the local Geocacher community, they seem to have lots of top-notch technology! |
<bka>: Mh, we'll think about that. |
<bka>: Thanks for your help! Goodbye. |
|
>> Connection closed. |