As you've no doubt guessed from the title, I've been trying to find information on decrypting a dataset that's been encoded using an RC5 schema - specifically RC5-64/12/8.
The reason I'm looking for it is for part of an Alternate Reality Game I'm involved in, called Perplex City. Part of the game involves solving puzzle cards in order to get information on a crime that's been committed (one which may or may not be tied to other crimes that have occurred, including the the murder of Perplex City's top investigative journalist, Pietro Salk), and the group I'm working with on one of the more difficult ones - #251, The Thirteenth Labor - has run into a dead end.
Now, the prevailing theory is that the data on the card has been encrypted using RC5-64/12/8 - just about everyone's agreed on that point. There is some disagreement, though, as to what initialization vectors were used (some are suggesting the ones found in this section of RSA Security's website), what the key is (most are leaning towards the one used by distributed.net), and similar matters.
I figured a good place to ask for information would be here, since it seems likely that someone here would be familiar with RC5-64/12/8 and thus be able to give us some pointers on decrypting the data.
So, if anyone could give us some pointers in that regard, we'd really appreciate it.
The reason I'm looking for it is for part of an Alternate Reality Game I'm involved in, called Perplex City. Part of the game involves solving puzzle cards in order to get information on a crime that's been committed (one which may or may not be tied to other crimes that have occurred, including the the murder of Perplex City's top investigative journalist, Pietro Salk), and the group I'm working with on one of the more difficult ones - #251, The Thirteenth Labor - has run into a dead end.
Now, the prevailing theory is that the data on the card has been encrypted using RC5-64/12/8 - just about everyone's agreed on that point. There is some disagreement, though, as to what initialization vectors were used (some are suggesting the ones found in this section of RSA Security's website), what the key is (most are leaning towards the one used by distributed.net), and similar matters.
I figured a good place to ask for information would be here, since it seems likely that someone here would be familiar with RC5-64/12/8 and thus be able to give us some pointers on decrypting the data.
So, if anyone could give us some pointers in that regard, we'd really appreciate it.
Comment