-8
1
I have created a simple encryption algorithm. Your challenge, if you choose to accept it, is to re-produce the algorithm that encodes one string into it's encoded counterpart and then back again by decoding.
The winning criteria is as follows:
- Provide the algorithms that was used to produce the answers
- Produce the algorithms in 200 bytes or less per algorithm
- The algorithms have to be effective on all strings
The smallest algorithms or code snippets that produces the correct answers wins.
Strings:
Start: | Out:
-------------------------|-----------------------
I'll undefine your face | M-tv,â~hknszs0}u}|,tqgk
This is a test | Xnq},wâ$g(~qüä
Another example | Etw~tsé$kÇky~|i
Meaning of life: 42 | Qkixu|w$un*xwvi@(>>
Happy cracking!
3Please do not delete and repost questions. The correct way to modify a question is via an edit. – Doorknob – 2014-09-10T21:25:25.753
3Encryption:
print'M-tv,â~hknszs0}u}|,tqgk'
. Decryption:print'I'll undefine your face'
. Do I win? (This problem is really underspecified.) – xnor – 2014-09-10T21:41:05.6731You should (at a minimum) add several (at least) plaintext-encrypted pairs and add the condition that it must output them all correctly. – Geobits – 2014-09-10T21:42:25.623
@xnor: You don't. Encryption is bijective. – Dennis – 2014-09-10T21:44:45.597
1@Dennis In that case, I'll just xor the byte diff. Techno, I think what you intend is for us to figure out what cool algorithm you used to do the encryption, but with one example, people will almost surely do something cheap that just works for those strings. – xnor – 2014-09-10T21:47:10.977
This question appears to be off-topic because its winning criterion and its tags contradict themselves. – Timtech – 2014-09-18T21:47:42.747