XOR decryption

AUTHOR

Andrei Osipov

https://projecteuler.net/problem=59

Each character on a computer is assigned a unique code and the preferred standard is ASCII (American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107.

A modern encryption method is to take a text file, convert the bytes to ASCII, then XOR each byte with a given value, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the cipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.

For unbreakable encryption, the key is the same length as the plain text message, and the key is made up of random bytes. The user would keep the encrypted message and the encryption key in different locations, and without both "halves", it is impossible to decrypt the message.

Unfortunately, this method is impractical for most users, so the modified method is to use a password as a key. If the password is shorter than the message, which is likely, the key is repeated cyclically throughout the message. The balance for this method is using a sufficiently long password key for security, but short enough to be memorable.

Your task has been made easy, as the encryption key consists of three lower case characters. Using cipher.txt https://projecteuler.net/project/resources/p059_cipher.txt, a file containing the encrypted ASCII codes, and the knowledge that the plain text must contain common English words, decrypt the message and find the sum of the ASCII values in the original text.

use v6;




my constant @common-words = <the was who not did with have does and one that>;

sub infix:<XOR>(@cipher, @password) {
    @cipher Z+^ flat (@password xx *);
}

sub as-code(Str $w) {
    my @x = $w.comb.map(*.ord)
}

sub as-word(*@s) {
    @s.map(*.chr).join
}

sub guess-password(Str $w, @cipher) {
    my @word = as-code $w;

    my @chunks = @cipher.rotor((@word.elems) => -(@word.elems - 1));
    my %tries;
    my $offset = 0;

    for @chunks -> @chunk {
        
        my @password  = @chunk[^3] XOR @word;
        
        my $password  = as-word @password;
        
        next unless $password ~~ /^^ <[a..z]> ** 3 $$/ ;
        my $decrypted = as-word @cipher[$offset .. *] XOR @password;
        
        my $count =  [+] do for @common-words.grep({$_ !~~ $w}) -> $word {
            elems $decrypted ~~ m:g:i/$word/
        }

        %tries{$password} += $count if $count > 0;

        return %tries if $count > @common-words.elems;

        $offset   += 1;
        $offset div= $w.chars;
    }
    %tries;
}

sub MAIN(Bool :$verbose = False,
        :$file = $*SPEC.catdir($*PROGRAM-NAME.IO.dirname, 'cipher.txt'),
        :$word = @common-words[0],
        :$pass is copy,
        Bool :$test = False) {
    return TEST if $test;
    die "'$file' is missing" unless $file.IO.e ;
    my @cipher     = map *.Int, split /<[,]>/ , slurp $file;

    unless $pass {
        my %variants = guess-password $word, @cipher;
        $pass  = %variants.pairs.max(*.value).key;
        say "The password is more likely to be '$pass'. " if $verbose;
    }

    my $decrypted =  as-word @cipher XOR as-code($pass);
    
    say "The message: {$decrypted.perl}" if $verbose;
    say [+] as-code $decrypted;
    say "Done in {now - BEGIN now}" if $verbose;
}

sub TEST {
    use Test;
    is as-code("abc"), [97,98,99], "as-code works";
    is as-word(100,101,102), "def", "as-word works";
    is as-word([79,59,12] XOR [103,111,100]), "(Th", "XOR works";
    done;
}

# vim: expandtab shiftwidth=4 ft=perl6

See Also

prob001-cspencer.pl

Multiples of 3 and 5

prob001-eric256.pl

Multiples of 3 and 5

prob001-grondilu.pl

Multiples of 3 and 5

prob001-hexmode.pl

Multiples of 3 and 5

prob001-unobe.pl

Multiples of 3 and 5

prob002-eric256.pl

Even Fibonacci numbers

prob002-gerdr.pl

Even Fibonacci numbers

prob002-hexmode.pl

Even Fibonacci numbers

prob003-eric256.pl

Largest prime factor

prob003-gerdr.pl

Largest prime factor

prob003-hexmode.pl

Largest prime factor

prob003-lanny.pl

Largest prime factor

prob004-unobe.pl

Largest palindrome product

prob004-xfix.pl

Largest palindrome product

prob005-unobe.pl

Smallest multiple

prob005-xfix.pl

Smallest multiple

prob006-polettix.pl

Sum square difference

prob007-polettix.pl

10001st prime

prob008-duff.pl

Largest product in a series

prob008-duff2.pl

Largest product in a series

prob009-gerdr-feeds.raku

Special Pythagorean triplet

prob009-gerdr.raku

Special Pythagorean triplet

prob009-polettix.pl

Special Pythagorean triplet

prob010-polettix.pl

Summation of primes

prob011-moritz.pl

Largest product in a grid

prob012-polettix.pl

Highly divisible triangular number

prob013-grondilu.pl

Large sum

prob014-felher.pl

Longest Collatz sequence

prob015-felher.pl

Lattice paths

prob016-grondilu.pl

Power digit sum

prob017-duff.pl

Number letter counts

prob018-felher.pl

Maximum path sum I

prob019-grondilu.pl

Counting Sundays

prob020-grondilu.pl

Factorial digit sum

prob021-gerdr.pl

Amicable numbers

prob022-grondilu.pl

Names scores

prob023-shlomif.pl

Non-abundant sums

prob024-moritz.pl

Lexicographic permutations

prob025-polettix.pl

1000-digit Fibonacci number

prob026-shlomif.pl

Reciprocal cycles

prob027-shlomif.pl

Quadratic primes

prob028-shlomif.pl

Number spiral diagonals

prob029-gerdr.pl

Distinct powers

prob029-polettix.pl

Distinct powers

prob031-shlomif.pl

Coin sums

prob033-andreoss.pl

Digit cancelling fractions

prob034-quinny.pl

Digit factorials

prob036-xenu.pl

Double-base palindromes

prob038-andreoss.pl

Pandigital multiples

prob039-quinny.pl

Integer right triangles

prob041-heyajulia-alternative.raku

Pandigital Prime

prob041-heyajulia.raku

Pandigital Prime

prob042-shlomif.p6

Coded triangle numbers

prob047-gerdr.pl

Distinct primes factors

prob052-duff.pl

Permuted multiples

prob053-duff.pl

Combinatoric selections

prob053-gerdr.pl

Combinatoric selections

prob054-andreoss.pl

Poker hands

prob055-shlomif.p6

Lychrel numbers

prob056-shlomif.p6

prob063-moritz.pl

Powerful digit counts

prob063-polettix.pl

Powerful digit counts

prob065-andreoss.pl

Convergents of e

prob065-grondilu.pl

prob066-andreoss.pl

Diophantine equation

prob067-felher.pl

Maximum path sum II

prob080-andreoss.pl

Square root digital expansion

prob081-moritz.pl

Path sum: two ways

prob089-andreoss.pl

Roman numerals

prob092-moritz.pl

Square digit chains

prob097-andreoss.pl

Large non-Mersenne prime

prob098-andreoss.pl

Anagramic squares

prob099-andreoss.pl

Largest exponential

README.md

The Camelia image is copyright 2009 by Larry Wall. "Raku" is trademark of the Yet Another Society. All rights reserved.