|
Post by mrpoirot on Jul 8, 2019 18:09:30 GMT -5
Good point. However, I think that the solution is not going to have any compromises in it. Lukas could have picked any url he wanted and adapt the poem to it. I think that once we figure these three stanzas out, it will be obvious to us that it is correct... But what can it be...
|
|
|
Post by susb8383 on Jul 9, 2019 17:54:59 GMT -5
It's not pronounced MITCHIGAN. It's pronounced Mishigan.
|
|
|
Post by squirejames88 on Jul 9, 2019 18:30:03 GMT -5
I have to agree with susb8383. Having been a michigander for 13 years, it is Mishigan.
|
|
|
Post by mrpoirot on Jul 18, 2019 20:19:36 GMT -5
The line: "Ten cuts, ten pins and turn" feels like it is trying to say something. Most, me included, seem to think it means that the first key is 10 characters long. But what if that is not the case? I started reading about locks and the standard door locks we use are actually called pin tumbler blocks. What if key one has the format of a tumblr blog url? With perhaps 10 words separated by dashes like: aaa-aaa-aaa-aaa-aaa-aaa-aaa-aaa-aaa-aaa.tumblr.com? I have never used Tumblr (don't know if it is still popular or not) but I read that you can prevent robots from indexing pages. Sounds odd but what if???
|
|
|
Post by elysethecat on Jul 19, 2019 4:39:54 GMT -5
Someone mentioned this earlier, that ten cuts could be the digits of an ipv6 and the pins would be the dots in the colons. Example (I'm just making up these digits) 4:c4:22:fe:66:8 - it doesn't seem very likely as a solution, but I like the idea of putting more thought and weight on this phrasing.
|
|
|
Post by treasurer on Sept 3, 2019 10:05:20 GMT -5
The first key is quite standard Ten cuts, ten pins and turn But the key is split in three And must be put together first
Just keeping it simple. Maybe Lukas is only saying Key 1 is a phone number and that's all:
10 cuts (the holes in the dial)
10 pins (a finger in a hole 10 times)
turn (dial away!)
|
|
|
Post by efanton on Dec 20, 2019 19:55:25 GMT -5
Im convinced that we are missing a step rather than we have not guessed the right answers to the stanza's
Ten cuts, ten pins and turn
Was in a hospital waiting room for a good while this week and brought a copy of the verses just in case I had a flash of inspiration.
It then occurred to me, if there is an additional step to process the numbers before checking the key, instructions on what to do would have been included in the verses. The obvious thing for Lukas to do in order to hide those instructions in plain sight would be to hide them in an anagram.
ENCRIPT and DECRIPT would both work as part of an anagram for Ten cuts, ten pins and turn It is also an appropriate length for an anagram. Im thinking along the lines of the name of a cipher followed by ENCRIPT or DECRIPT There's a lot of different ciphers out there, but not a massive amount. Should be fairly easy to identify a cipher to use on the numbers we have if my hunch is correct
In UK English they would be spelled ENCRYPT and DECRYPT but I think US English substitutes a I for the Y
Can any of our US members confirm whether ENCRIPT and DECRIPT are the correct spelling in the USA?
|
|
|
Post by keladry12 on Dec 21, 2019 2:03:24 GMT -5
In the US encrypt and decrypt are spelled with y, sorry. It could be a misspelling though, to force the anagram? interesting idea
|
|
|
Post by captnkush on Dec 21, 2019 6:56:24 GMT -5
Im convinced that we are missing a step rather than we have not guessed the right answers to the stanza's Ten cuts, ten pins and turnWas in a hospital waiting room for a good while this week and brought a copy of the verses just in case I had a flash of inspiration. It then occurred to me, if there is an additional step to process the numbers before checking the key, instructions on what to do would have been included in the verses. The obvious thing for Lukas to do in order to hide those instructions in plain sight would be to hide them in an anagram. ENCRIPT and DECRIPT would both work as part of an anagram for Ten cuts, ten pins and turn
It is also an appropriate length for an anagram. Im thinking along the lines of the name of a cipher followed by ENCRIPT or DECRIPT There's a lot of different ciphers out there, but not a massive amount. Should be fairly easy to identify a cipher to use on the numbers we have if my hunch is correct In UK English they would be spelled ENCRYPT and DECRYPT but I think US English substitutes a I for the Y Can any of our US members confirm whether ENCRIPT and DECRIPT are the correct spelling in the USA? thinking about your theory a bit i found this and gotta say something about this is really sending off bells. www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties
|
|
|
Post by captnkush on Dec 21, 2019 6:59:38 GMT -5
I think you may be on verge of figuring out how were supposed to these to two keys . Nice catch.
|
|
|
Post by efanton on Dec 22, 2019 14:20:20 GMT -5
In the US encrypt and decrypt are spelled with y, sorry. It could be a misspelling though, to force the anagram? interesting idea Thanks. thats a shame, but then that would probably have been too simple. I cant believe at least someone, if not many, have not got the correct answers to stanza's 3 & 5. Stanza 4 it appears different people have different ideas, but I assume at this point many have tried all possible combinations with what they have. I'm convinced it's not as simple as entering 313xxx4566 into the key checker. If I am right there's something in the verses that instructs us what to do with our answers. I am trying anagrams of various lines in the verses trying to find a hidden message, but no luck so far. The first key is quite standard
Ten cuts, ten pins and turnThere is possibly more meaning to those two lines than any of us have have yet realised, or something hidden within it to give us instructions on what to do with our answers another approach I have tried Then with your newfound knowledge
You must travel through black flame
The place where alchemy’s best is found
Will help you win this gameSounds very much like Harry Potter and the Mirror of ERISED (desire backwards). I'm sure this has already been mentioned. However, no one has so far suggested how to use that, so after a bit of thinking and head scratching I have thought of two possible ways to use it with our keys The first is obvious, simply reverse the key, so 313xxx4566 now becomes 6654xxx313 The second is a little bit tricky, but we know Lukas loves tricky . I simply reverse each part of the key and then join them together 313xxx4566 becomes 313xxx6654 (unfortunately 313 and xxx are symmetrical so a better example would be 1234567890 becomes 3216540987) I have tried both in the key checker with my possible solution to stanza 4 with no luck, but maybe others might have success with their solutions.
|
|
|
Post by captnkush on Dec 22, 2019 19:01:56 GMT -5
Im also cooking up somthing in light of your discovery....im trying to dail it in a bit more b4 i share...to be continued
|
|
|
Post by jss05010 on Jan 7, 2020 20:27:31 GMT -5
I think captnkush is onto an interesting path with the cryptography keys theory, 'asymmetric keys' require 2 keys (public and private).
|
|
|
Post by efanton on Jan 7, 2020 21:29:54 GMT -5
I think captnkush is onto an interesting path with the cryptography keys theory, 'asymmetric keys' require 2 keys (public and private). But the whole point of asymmetric keys is that without both keys being known, decryption is virtually impossible. With a single key known and a super computer available to you (which very few countries let alone big businesses or individuals have), it has been estimated that a 32 bit key will currently take thousands of years to crack. Moore's law is relevant here. Basically Moore's law states that computing power doubles every two years as new technology develops. The thousands of years answer is the current answer, had you asked the same question back in the year 2000 it would have taken the best supercomputers of the time over a BILLION years to crack as 32 bit key. If we are prepared to wait until 2050 then supercomputers following Moore's law will only take a year or two. I think we can very safely assume that asymmetric encryption is very definitely not part of the hunt. Computer security and encryption is a very interesting topic, I worked in computer security on server farms and data centres for about 20 years, and I can assure you that although interesting there is no way that encrypted keys will be part of the solution to this hunt. Even getting your head around the methods used by computers to exchange encrypted keys is mind numbing. It took me months to finally get my head around how a Diffie–Hellman key exchange actually worked. This is the process used by most encryption protocols to ensure that encrypted keys can be exchanged securely without divulging the contents of both keys to either computer. If it was simply entering two keys in two separate fields on a web page then we are not talking about encryption. We are simply talking about permutations. The total number of permutations would be 10,000,000,000,000,000,000 and because of that we can very safely assume that here again we are not supposed to try work through all permutation to get a result. If we were right in saying the first 3 digits of the 1st key were 313, and the last 4 digits were 4566, that would still leave us with the middle three digits. If you were to try brute force the solution by substituting ever possible answer for those three digits then you would still have to try 1000 different combinations to get the 1st key. I'm pretty certain this has been done already and yet no one has the answer. This leaves us with the conundrum that we have either the 313 and 4566 totally wrong (which is possible but I personally would say unlikely) or that we have missed a step before entering our solution for the first key. Maybe the order of our answers to the individual stanza's must be reordered (eg xxx3134566, 4566xxx313, 3134566xxx etc) but if this is the case then there must be something in the stanza's to direct us as to which order they are put in. I have been playing with that idea for weeks now and still have come up with nothing. If that was the case you decided foolishly to try brute force an answer to it, good luck, that would involve 1000 x 1000 permutations. Anyhow long story short I think it is extremely safe to assume that the solution to this hunt has nothing to do with key encryption methods used by any computer systems.
|
|
|
Post by jss05010 on Jan 8, 2020 16:05:21 GMT -5
I should've been more clear, I was thinking more along the lines of using that encryption method as a structure, not necessarily as a method of solving the problem. The riddle implies the key is 3 parts, similar to having 2 public and 1 private key. I'm curious if it just a way of fitting the pieces together, or how to interpret each piece. Or use the keys as a legend for some type of cipher.
|
|