No, which is why I worked up a secure inthread system a couple days ago. But I'm not bothering with it if paranoia is going to kill me on the first day. BURN THE WITCHBeherith wrote:Are we allowed to pm each other?
Spring Werewolf I
Moderator: Moderators
Re: Spring Werewolf I
Re: Spring Werewolf I
This is too easy.aegis wrote:hi i am a wolf dont kill my lurker because hes a wolf too
 Spawn_Retard
 Posts: 1248
 Joined: 21 Dec 2006, 14:36
Re: Spring Werewolf I
GG lurker,
Lurker to go.
Lurker to go.

 Moderator
 Posts: 2463
 Joined: 12 Oct 2007, 09:24
Re: Spring Werewolf I
lurker wrote:Uh huh. Assuming I'm not dead I'll have basic instructions for communicating with any other person in the thread encrypted soon. All you need is two prime numbers.
How do you tell the receiver your 2 prime numbers if only wolves can communicate outside the thread?This is the only communication that is allowed between players during daytime.
Re: Spring Werewolf I
A short introduction to public key cryptography based on RSA. Each person has a private key and a public key. These keys are generated from two prime numbers that are secret to everyone. The public key is given out freely, and when a message is encrypted with this public key, the only person that can read it is the one with the private key. Two people that want to communicate with each other each share public keys openly and send their messages openly, and no one else can read them, only see that there is a message. I figured it would come in handy to be able to scratch out some calculations on a piece of paper and send an encrypted message to another villager.
Re: Spring Werewolf I
That would make it obvious who's the wolf.
3 Votes for lurker so far.
3 Votes for lurker so far.
Re: Spring Werewolf I
Hoi
let's see how this goes...
let's see how this goes...
Re: Spring Werewolf I
Hoi
cause I cba to unignore anyone
On a serious note, his argument against lurker is also evidence that he is looking for a scape goat.
cause I cba to unignore anyone
On a serious note, his argument against lurker is also evidence that he is looking for a scape goat.
Re: Spring Werewolf I
You can say that for everyone.rattle wrote:On a serious note, his argument against lurker is also evidence that he is looking for a scape goat.
Don't bother killing me, I'm just a villie.
And yes saying that will make people think I'm a wolf, but I'm just a villie...
Re: Spring Werewolf I
HE'S A VILLIE! KILL HIM! HOIDon't bother killing me, I'm just a villie.
And yes saying that will make people think I'm a wolf, but I'm just a villie...
Re: Spring Werewolf I
You'd better not be the seer and leave us in the dark after you're violently lynched.Hoi wrote:I'm just a villie...
Re: Spring Werewolf I
Ok guys, lets get this over with fast:
I propose the following method to win this game (without using PGP, or other software besides windows calculator).
We were all sent group PMs, luckily BCCd. So, each group, seers, wolfes and villagers all got sent their own batch of pms. Lets suppose for the sake of the exercise, that it takes more than a minute to make all of these group pms.
So, each group has a very specific secret key, namely the arrival time of his PM.
Do not share this timestamp!
I propose the following method of verification of this time stamp for everyone:
Take the minute value of your time stamp. Generate a random 10 digit number, lets call this N.
Multiply your timestamp with N. Add the floor of the square root of N to it. Again, multiply it by N and add the floor of the square root of N.
Then everyone proceeds to publish this number. Once all (or most, excluding the wolves :) ) have published their calculated number, everyone publishes his random number, and verifies that he indeed knew the timestamp properly.
Now, there are a few possible attacks to this. I dont know how good the function is, so once the first random number is published, a wolf can try to find a random number that works with his calculated number to output the proper timestamp.
Further possible attacks and proof of the security of this hashing function are left as an exercise to the reader. (beyond the fact that the seers timestamp is unique, he might get killed off by wolves because of this).
I propose the following method to win this game (without using PGP, or other software besides windows calculator).
We were all sent group PMs, luckily BCCd. So, each group, seers, wolfes and villagers all got sent their own batch of pms. Lets suppose for the sake of the exercise, that it takes more than a minute to make all of these group pms.
So, each group has a very specific secret key, namely the arrival time of his PM.
Do not share this timestamp!
I propose the following method of verification of this time stamp for everyone:
Take the minute value of your time stamp. Generate a random 10 digit number, lets call this N.
Multiply your timestamp with N. Add the floor of the square root of N to it. Again, multiply it by N and add the floor of the square root of N.
Then everyone proceeds to publish this number. Once all (or most, excluding the wolves :) ) have published their calculated number, everyone publishes his random number, and verifies that he indeed knew the timestamp properly.
Now, there are a few possible attacks to this. I dont know how good the function is, so once the first random number is published, a wolf can try to find a random number that works with his calculated number to output the proper timestamp.
Further possible attacks and proof of the security of this hashing function are left as an exercise to the reader. (beyond the fact that the seers timestamp is unique, he might get killed off by wolves because of this).
Last edited by Beherith on 02 Apr 2009, 22:30, edited 1 time in total.
Re: Spring Werewolf I
I would rather use an algorithm that can't be broken with Excel. Good thinking, though.
Re: Spring Werewolf I
You sure that can be broken with excel? adding the floor of the square root makes factoring it useless.
Proof of break or you are a wolf.
Proof of break or you are a wolf.
Re: Spring Werewolf I
I don't think factoring out n at 10 digits would be very time consuming. But you can just make n BIGGAR.
Re: Spring Werewolf I
Stamp cant be hacked out of the encrypted numbers without N because of the multiple +floor(sqrt(N)) 's. That makes factoring utterly useless
N doesnt get published until everyone has published their encrypted number. Even then, once the first person publishes their N and the stamp becomes known, the wolf has to find a 10 digit random number that collides with his own published encrypted stamp so that he can decode it to the proper stamp, not the wolf stamp.
N doesnt get published until everyone has published their encrypted number. Even then, once the first person publishes their N and the stamp becomes known, the wolf has to find a 10 digit random number that collides with his own published encrypted stamp so that he can decode it to the proper stamp, not the wolf stamp.
Re: Spring Werewolf I
This feels just like any of the other Off topic topics.