OPERATION DEEP MAGIC: CRYPTANALYSIS
Reconnaissance
operatives infiltrated a corporate building and extracted electronics
and files encrypted with 56-bit DES. Items were
handed over to you, the cryptanalyst. Your mission is to decrypt the
files.
Real-world cryptanalysis, meticulously simulates techniques on the full 16-round encryption
Computer aided mathematics, computer algebra system, facilitates the manipulation of mathematical expressions in a couple of clicks
Index access to each cryptanalytic problem
Statistics and algebra
Differential cryptanalysis
Impossible differential cryptanalysis
Linear cryptanalysis
Retro-style roleplay simulation of a cryptanalyst career in signals intelligence
DLC: OPERATION DEEP MAGIC - ADVANCES IN CRYPTOLOGY 1
You attempt to reduce the complexity of linear cryptanalysis on DES - breaking the encryption further.
DLC: OPERATION DEEP MAGIC - ADVANCES IN CRYPTOLOGY 2
Electronics operatives planted a bug in the target computer system that had been encrypting in 168-bit 3DES. Text downloads from the remote target is available through your terminal. Your mission is to recover the keys.
Your coworkers are collecting texts that are protected with a more sophisticated encryption algorithm called 3DES (or Triple-DES). You are presented with challenging mathematical and computational problems requiring the use of other attack techniques. In hopes of finishing the problem solving with the least amount of work and memory, while considering the technological limitations or your computer systems, you carefully design and implement your attacks.
The story system generates dynamic scenarios and problems, and the menu system allows the cryptanalyst to select techniques and parameters. The system executes the attacks based on the choices regardless of better or worse solutions. The cryptanalyst sees the outcomes of what happens in a successful or an unsuccessful mission.
New Techniques:
Related-key slide
Related-key differential
Key collision
New Features:
Meticulously simulates techniques on the full 168-bit encryption
Instant completion of detailed statistics through a stochastic process
Text-based user interface
Last Updated: May 21, 2021.
Copyright © 2019 1013133