Skip to content

Commit 010c114

Browse files
committed
[euler] wrap text to within 80 chars
1 parent 286b09a commit 010c114

File tree

1 file changed

+27
-9
lines changed

1 file changed

+27
-9
lines changed

categories/euler/prob059-andreoss.pl

Lines changed: 27 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,33 @@
88
99
L<https://projecteuler.net/problem=59>
1010
11-
Each character on a computer is assigned a unique code and the preferred standard is ASCII (American Standard Code for Information Interchange). For example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107.
12-
13-
A modern encryption method is to take a text file, convert the bytes to ASCII, then XOR each byte with a given value, taken from a secret key. The advantage with the XOR function is that using the same encryption key on the cipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107 XOR 42 = 65.
14-
15-
For unbreakable encryption, the key is the same length as the plain text message, and the key is made up of random bytes. The user would keep the encrypted message and the encryption key in different locations, and without both "halves", it is impossible to decrypt the message.
16-
17-
Unfortunately, this method is impractical for most users, so the modified method is to use a password as a key. If the password is shorter than the message, which is likely, the key is repeated cyclically throughout the message. The balance for this method is using a sufficiently long password key for security, but short enough to be memorable.
18-
19-
Your task has been made easy, as the encryption key consists of three lower case characters. Using cipher.txt C<https://projecteuler.net/project/resources/p059_cipher.txt>, a file containing the encrypted ASCII codes, and the knowledge that the plain text must contain common English words, decrypt the message and find the sum of the ASCII values in the original text.
11+
Each character on a computer is assigned a unique code and the preferred
12+
standard is ASCII (American Standard Code for Information Interchange). For
13+
example, uppercase A = 65, asterisk (*) = 42, and lowercase k = 107.
14+
15+
A modern encryption method is to take a text file, convert the bytes to
16+
ASCII, then XOR each byte with a given value, taken from a secret key. The
17+
advantage with the XOR function is that using the same encryption key on the
18+
cipher text, restores the plain text; for example, 65 XOR 42 = 107, then 107
19+
XOR 42 = 65.
20+
21+
For unbreakable encryption, the key is the same length as the plain text
22+
message, and the key is made up of random bytes. The user would keep the
23+
encrypted message and the encryption key in different locations, and without
24+
both "halves", it is impossible to decrypt the message.
25+
26+
Unfortunately, this method is impractical for most users, so the modified
27+
method is to use a password as a key. If the password is shorter than the
28+
message, which is likely, the key is repeated cyclically throughout the
29+
message. The balance for this method is using a sufficiently long password
30+
key for security, but short enough to be memorable.
31+
32+
Your task has been made easy, as the encryption key consists of three lower
33+
case characters. Using cipher.txt
34+
C<https://projecteuler.net/project/resources/p059_cipher.txt>, a file
35+
containing the encrypted ASCII codes, and the knowledge that the plain text
36+
must contain common English words, decrypt the message and find the sum of
37+
the ASCII values in the original text.
2038
2139
Expected result: 107359
2240

0 commit comments

Comments
 (0)