Here is #2. I think it's a bit easier than the last one. I will wait longer this time before posting the answer. I think seeing the first one solved may help people anyways. Instructions for how these things are generated and tips for solving here. Here are presented three cryptograms all encrypted using the same cipher at different offsets against itself. Concentrate on breaking the messages, but bonus points if you are actually able to present the orinal (non-offset) cipher, key, and hat. 1. cya drkdc vgg mtqt kvxxyarie bpvkscc soskyirqs kvxxriiss swskirva 2. xbd agolixjxfmax nhrh amxxhem xmlrgom ehgdgde ahlvmf xbwwilf hx esizhs oshxx amxxhegde agqqsmchlm xfhdqhlq 3. qla txo uqkukwlw ok lmtxmzl svzqkwkio wlooplslmo kiilq yg uqkdvavmr kulm wkfqzl wkiobxql ok xpp fw wztkkp avwoqvzow
Yes I did use a hat. There are no carriage returns that I am aware of, so it's probably just normal word wrap you are seeing.
Joined: Nov 09, 2000
Here are the answers. If anybody wants me to I can go on posting these, but there doesn't seem to be much interest.
key:enterprise hat:solution #1 offset:3 Sun kicks off Java Community Process Executive Committee election #2 offset:5 Sun Microsystems Java Message Service Gaining Market Support As Global class Messaging Middleware Standard #3 offset:-2 Red Hat Proposes to Enhance Microsoft Settlement Offer By Providing Open Source Software to All US School Districts