Crypto Challenge Week 2

Can You Crack The Code?

This is the second issue of a new weekly cryptographic challenge that we are hoping to continue. The text below is enciphered with a common cipher, but our challenges will get progressively more challenging. The first person to solve the cipher and submit proof that they have broken the cipher will be recognized in next week’s challenge.
If you’re not familiar with the concept of a cipher, it is a method to encode messages to make them more difficult (or ideally impossible) to read if you do not know a password or key. A code ring or a secret alphabet are examples of very simple ciphers. You can learn more about cryptography and how to break some of our ciphers at practicalcryptography.com

 

GDHIJ TEJQI LNMNF SDYJK YNWXL MDBLL KZDDE SJNMG JWEIN ALHNM GNWML ZYNMV JWEWD MHNMG JFMTM LWLFF LALYV DWLBW DHFFM NIIMG LLOKL YNLWX LDSDT YMNPL FFGDH FMGDF LKYNW XLFMD GJALE DWLZY LJMMG NWZFH GDGJA LGJEI NMMIL YLZJY ESDYZ DDESJ NMGJW EGJAL QLLWJ QILQV JFMTM LWLFF MDXDW STFLP LWFQY JNWFJ WEHGD GJALT IMNPJ MLIVD ALYXD PLMGD FLHGD GJALP JELID VJIMV MGLNY SDTWE JMNDW VDTPT FMBWD HMGLW MGJMM GLYLJ YLMHD PLMGD EFDSS NZGMN WZMGL DWLQV IJHMG LDMGL YQVSD YXLMG LSNYF MPLMG DENFM GJMDS PLWMG LFLXD WEDSQ LJFMF QTMJF MGLSN YFMPL MGDEN FDSML WNWFT SSNXN LWMDW LPTFM GJALY LXDTY FLMDM GLFLX DWENM NFMGL YLSDY LWLXL FFJYV MDBWD HHLII GDHMD TFLQD MGMGL QLJFM JWEMG LPJWM GNFHJ FXDAL YMIVM JTZGM MDKYN WXLFQ VJWXN LWMHY NMLYF HGDYL IJMLG DHJXG NIILF JWEPJ WVDMG LYFDS MGDFL KYNWX LFHLY LZNAL WMDXG NYDWM GLXLW MJTYM DQLQY DTZGM TKHGD BLKMM GLPTW ELYGN FENFX NKINW LMGNF FVFML PDSGJ ANWZS DYMLJ XGLYD WLHGD HJFGJ ISQLJ FMJWE GJISP JWNFP LJWMM DNWEN XJMLM GJMJK YNWXL PTFMB WDHGD HMDTF LQDMG WJMTY LFJWE MGJMM GLDWL HNMGD TMMGL DMGLY NFWDM ETYJQ ILJKY NWXLQ LNWZM GTFDQ INZLE MDBWD HHLII GDHMD JXMJF JQLJF MPTFM NPNMJ MLMGL SDOJW EMGLI NDWSD YMGLI NDWXJ WWDMK YDMLX MGNPF LISSY DPFWJ YLFJW EMGLS DOXJW WDMEL SLWEG NPFLI SSYDP HDIAL FDWLP TFMMG LYLSD YLQLJ SDOMD YLXDZ WNFLF WJYLF JWEJI NDWMD SYNZG MLWHD IALFM GDFLM GJMHN FGMDQ LDWIV INDWF EDWDM TWELY FMJWE MGNFM GLYLS DYLJK YTELW MYTIL YDTZG MWDMM DBLLK SJNMG HGLWQ VFDED NWZNM HDTIE QLJZJ NWFMG NFNWM LYLFM JWEHG LWMGL YLJFD WFHGN XGPJE LGNPQ NWEGN PFLIS WDIDW ZLYLO NFMNS PLWHL YLJII ZDDEM GNFKY LXLKM HDTIE WDMQL JZDDE DWLQT MJFMG LVJYL QJEJW EHDTI EWDMD QFLYA LMGLN YSJNM GHNMG VDTFD VDTJY LWDMQ DTWEM DBLLK SJNMG HNMGM GLPWD YJYLI LZNMN PJMLZ YDTWE FLALY HJWMN WZMDJ KYNWX LMDZN ALXDI DTYMD MGLWD WSTIS NIPLW MDSGN FKYDP NFLDS MGNFD WLXDT IESTY WNFGJ WNWSN WNMLW TPQLY DSPDE LYWLO JPKIL FJWEF GDHGD HPJWV MNPLF KLJXL GJFQL LWQYD BLWJW EGDHP JWVKY DPNFL FYLWE LYLEH DYMGI LFFQV MGLSJ NMGIL FFWLF FDSKY NWXLF JWEMG DFLMG JMGJA LQLLW QLFMJ QILMD NPNMJ MLMGL SDOGJ ALFTX XLLEL EQLFM QTMNM NFWLX LFFJY VMDQL JQILM DENFZ TNFLM GNFXG JYJXM LYHLI IJWEM DQLJZ YLJMS LNZWL YJWEE NFFLP QILYJ WEPLW JYLFD FNPKI LJWEF DYLJE VMDDQ LVKYL FLWMW LXLFF NMNLF MGJMD WLHGD ELXLN ALFHN IIJIH JVFSN WEMGD FLHGD JIIDH MGLPF LIALF MDQLE LXLNA LENHN IIDWI VPLWM NDWDW LPDEL YWNWF MJWXL JILOJ WELYA NENEW DMGNW ZLIFL QTMEL XLNAL PLWGL MGDTZ GMDSW DMGNW ZLIFL JWESD TWEMG LHJVM DEDNM WDPJW HJFLA LYPDY LJQIL MDZNA LJFFT YJWXL FDYJS SNYPL EMGNW ZFHNM GFMYD WZLYD JMGFJ WEWDP JWDQF LYALE MGLPI LFFGD HLALY GLJIH JVFFT XXLLE LENWG NFELX LKMND WFJFG LBWLH HLIIM GNFFN ELDSM GLHDY IENMN FWDMM GLYLS DYLWL XLFFJ YVSDY JKYNW XLMDG JALJI IMGLJ QDALW JPLER TJINM NLFQT MNMNF ALYVW LXLFF JYVMD FLLPM DGJAL MGLPN HDTIE LALWQ LQDIE MDFJV MGJMM DKDFF LFFMG LPJWE MDJIH JVFDQ FLYAL MGLPN FEJWZ LYDTF QTMMD JKKLJ YMDKD FFLFF MGLPN FTFLS TIMGT FNMNF HLIIM DFLLP KNDTF SJNMG STIGT PJWLY LINZN DTFFN WXLYL JWEJI FDMDQ LFDQT MVDTP TFMGJ ALMGL PNWEF DHJMX GSTIM GJMHG LWNMN FWLLE STIMD QLDMG LYHNF LVDTP JVQLJ QILMD XGJWZ LMDMG LDKKD FNMLR TJINM NLFJW ENMPT FMQLT WELYF MDDEM GJMJK YNWXL JWELF KLXNJ IIVJW LHKYN WXLXJ WWDMD QFLYA LJIIM GDFLM GNWZF HGNXG JYLXD WFNEL YLEZD DENWP LWQLN WZDSM LWDQI NZLEN WDYEL YMDPJ NWMJN WMGLF MJMLM DJXMJ ZJNWF MSJNM GJZJN WFMXG JYNMV JZJNW FMGTP JWNMV JWEJZ JNWFM YLINZ NDWJW EMGLY LSDYL GLPTF MGJAL JPNWE ENFKD FLEMD JEJKM NMFLI SJXXD YENWZ MDMGL HNWEJ WEJFM GLAJY NJMND WFDSS DYMTW LENXM JMLJW EJFNF JNEQL SDYLW DMELA NJMLS YDPHG JMNFZ DDENS KDFFN QILQT MQLJQ ILMDE DLANI NSWLX LFFNM JMLEJ KYNWX LPTFM MJBLZ YLJMX JYLMG JMWDM GNWZZ DLFDT MDSGN FPDTM GHGNX GNFWD MSTII DSMGL JQDAL WJPLE SNALR TJINM NLFJW EMDFL LJWEG LJYGN PGLFG DTIEF LLPMD QLJII SJNMG JIINW MLZYN MVJII GTPJW NMVJW EJIIY LINZN DWJWE WDMGN WZNFP DYLWL XLFFJ YVMGJ WMDFL LPMDG JALMG NFIJF MRTJI NMVSD YPLWN WZLWL YJIUT EZLPD YLQVM GLLVL FMGJW QVMGL GJWEF SDYLA LYVDW LXJWF LLQTM ALYVS LHGJA LMDSL LILAL YVQDE VFLLF HGJMV DTJKK LJYMD QLSLH SLLIH GJMVD TJYLJ WEMGD FLSLH HNIIW DMEJY LMDDK KDFLM GLPFL IALFM DMGLP JWVHG DGJAL MGLPJ ULFMV DSMGL FMJML MDELS LWEMG LPJWE NWMGL JXMND WFDSP LWJWE LFKLX NJIIV DSKYN WXLFS YDPHG NXGMG LYLNF WDJKK LJIMG LLWEN FLALY VMGNW ZILMJ KYNWX LMGLY LSDYL JNPJM INANW ZJWEP JNWMJ NWNWZ FMJML MGLFM JMLMG LPLJW FHNII JIHJV FQLUT EZLEG DWDTY JQILJ WEKYJ NFLEQ VLALY VDWLS DYMGL ATIZJ YNFJI HJVFM JBLWQ VJKKL JYJWX LFJWE MGLYL FTIMD SMGNW ZFJWE MGLHD YIEXD WFNFM FDWIV DSMGL ATIZJ YJWEM GLSLH SNWEJ KIJXL HGLWM GLPJW VGJAL WDMGN WZMDY LFMTK DWJXL YMJNW KYNWX LDSMG LKYLF LWMMN PLHGD PNMNF HLIIW DMMDW JPLWL ALYED LFJWV MGNWZ QTMKY LJXGK LJXLJ WEZDD ESJNM GQTMG LNFYL JIIVJ ZYLJM LWLPV MDQDM GJWEL NMGLY DSMGL PGJEG LDQFL YALEM GLPHD TIEGJ ALIDF MGNPQ DMGFM JMLJW EYLKT MJMND WDWPJ WVDXX JFNDW F

Last week’s cipher was an excerpt from chapter 4 of Don Quixote using the ROT13 cipher, or the Caesar Cipher with a shift of 13. It was first broken by Cameron Grimm on November 19th.

The Caesar Cipher is one of the simplest possible ciphers and is within a category known as substitution ciphers. It gets its name from Julius Caesar who utilized it in sending messages. I works by shifting a letter a certain number of spaces in the alphabet. ROT13 specifically, which is simply a Caesar Cipher with a shift of 13, is commonly used online for hiding trivial information that is not actually meant to remain secret.

 In a Caesar Cipher with a shift of 1, A would become B, B would become C, C would become D, and so on. In last week’s, A became N, and B became O.

Last week’s cipher can be found here.

Completed responses can be submitted on this Google Form.