[ARG] The Pizza Code Mystery

I do not know how python works at all, so this may be a really stupid question, but wouldn’t this sent the data as ASCII characters? I mean, B2 being two bytes instead of one?

I’ve been reading most of the posts since the grilled pizza was discovered (this must be the third time I’ve done it). A summary:

Aparently the solution was close by january 2013.

Stormseeker really wanted that people wrote a story, specifically, he insisted in the relation of the Niobium isotopes, the AI, the information on the whiteboards and the 752 code. The relation of the Niobium with the AI is pretty clear.

The IRC clues were somewhat related to the next step that needed to be taken, at least for the previous puzzles.

The attemps to solve the 752 halos code were when stormseeker said somebody was close, were basically focused on block ciphers and turning it into an image. Neither of them yielded any results, the images were just noise, and the decryption attemps failed one after another, either due to wrong password, wrong algorithm etc. Maybe all of them were wrong, we do not know.

Stormseeker said, “How do you know this has anything to do with encryption” and when somebody complained that months of work went to waste, he replied “Not necessarily”, this could mean that in fact it has something to do with encryption, or, that it doesn’t but that does not mean that months of work went to waste, since people built a story around the AI.

And now for something completely different… “It’s not random bytes btw, but its definitely designed to look that way.” This I do not understand, “designed to look that way”, does it means that the code it’s not the product of an encryption algorithm but that it was made “by hand” so it looked random but actually it is not random? I do not understand the finer meanings in words, so I might be wrong, and this just means that it’s not random bytes but encrypted data. Also, the fact that he reffers to the code as bytes inteas of Hex characters could mean something.

That phrase just gave me an idea. “The images were just noise.”
It’s possible to embed sound and/or text into an image file as a way of hiding it…
Perhaps we should be looking to steganography as a potential solution?
It’s not technically encryption, after all…

Another thing that just jumped out at me while trying to find older clues was the “Time reveals all” message.
The BMRF.us site has dates on it… maybe we should try using the DALsys login with our system times set to those dates?
EDIT: No dice, setting the system clock to August 10, 16, and 17 do nothing on the BMRF site.

I already looked on several files like the grilledpizza with no luck, but I used an application that I found on the internet that was pretty old, so I cannot confirm there is no hidden data on the images. Nevertheless, bmrf.us wasn’t online at the time of the discovery of HALOS.txt, iirc, and there is where most images are.

Has the 752 file been looked at that way, though?

Do you mean search for a message within the 752code without decrypting? Well, I don’t know, there’s nothing on the forum. I’ve tried finding patterns and analysing it statistically. The only thing I found was that the numbers are present in a bigger % than they should, and the letters in a smaller %. You can see the frequency here

https://www.characterfrequencyanalyzer.com/

The % of A+B+C+D+E+F sould be 37.5%, but it is 32.5%, this could further indicate that it is not random but made to look random when you do an entropy test.

But I don’t know, it’s to be expected to have some deviation from the expected value, specially if the sample is not that big. I think that some analysis could be made to get a confidence interval so we could know if it is statistically relevant. I do not remember my statistics 101 so well :smiley:

Other than that I did not find anything relevant, but then again, I’m neither a genius nor more than one person, so I might have missed something. Another point for steganography is that it cannot be bruteforced, afaik, if it is done properly, there could perfectly be some message hidden, maybe just 12 bytes are relevant and the rest is just noise, but without knowing how it was hidden it would be nearly impossible to find.

Edit: I did the analysis, and apparently the deviation it’s outside a confidence interval of 99%, that is, the chance of a deviation from the expected value like the one on the 752code is less than 1%. Nevertheless I would not bet my life that the analysis was properly done.

Edit 2: Since I did not trust the analysis I had made, I did a simulation of random strings of 752 hex characters(couple thousand of them), in a bit less than 0.5% of them, the letters made up for 32.5% or less. So the deviation on the 752code is either a weird coincidence, or the code is not as random as it seems. I mean, this kind of deviation is unlikely, but not impossible, not even extremely rare.

The thing about the DALsystems terminal screen with the 1.192.12.156:2828 address is that it didn’t appear until a year after the HALOS hex code. So, if there is a clue on that terminal screen that is crucial and needed to solve the puzzle, it would mean that the code would have been unsolvable for a year. This contradicts stormseeker’s statement:


That is correct. If we want to send the code as raw bytes, we can do something like this:

[code]import socket
from binascii import unhexlify

-snip-

s.send(unhexlify('b32b003a35badd66577c24c14fc919064346d131a7c54bb82ffe03e022615777247923dc21f62cd4182e91c3b267b545abcaedaf0261510d4eea1e87cd33c7c77131309cc4280eb4243d1154f044f9cf6296d9bff7397e4390987fe63203da0de40278b…))
[/code]


Things that were definitely designed to look random, are the TV snow (white noise) textures seen on some of the monitors/displays in the game. What if data from one of those texture files was used as a XOR OTP key? In his PM to Guns, 0418/Storm talks a bit about information-theoretically secure OTP using random bits, but concludes that he thinks we can rule it out.

At this point I’m not sure if this is a viable theory because I don’t know if the data inside these texture files will have a high enough entropy to be used as an XOR OTP key. Maybe we first need to convert the vtf files in question into a different format or something.

I know this is gonna sound extremely stupid, but I was watching Hunger Games: Catching Fire and I realized the arena they were having the Games in was supposed to look like a clock but it was divided into pieces like a pizza.

Edit: Time Reveals all. Do you suppose the clocks displayed throughout black mesa hold the answer? when the answers are all around you.

There are several files with noise. Most of them are just too big to use, but there is one called post_processnoise.vtf which, if treated as bmp monocrome, generates a file just some bytes longer than the hex code, doing an entropy analysis to the file as raw binary data, without taking into account the header, returns entropy of 0.99586, so extremely high entropy. Now, several steps had to be taken to turn the file into what we needed, coupled with the fact that storm said we could rule it out, I think we are aproaching a dead end.

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

Without “FF FF FF 00” the file is 4096 bits, the image is 64x64 pixels bmp monochrome. I don’t know how to use it to unxor the 752code, so I’ll let this here just in case somebody wants to try. I think we are straying away again, but this may be worth a try since it would not take a lot of time to check.

EDIT: A 47x47 bmp monochrome image has exactly 376 bytes, without taking into acount the header. That is, the 752 code when turned into a bmp monochrome image could be square, so it could be a QR code. I’ll attach it, but I don’t know what to make of it, the size does not fit with the normalized QR codes, and it also lacks the control squares on the corners. The high entropy of the 752 doesn’t help neither… :frowning:

EDIT 2: I was wrong, disregard the 47x47 thing, now I know a bit more about bmp monochrome files. The file will have an array with the information of each pixel for each horizontal line of pixels in the image, stored in groups of 4 bytes, since 47 bits is more than 4 bytes but less than 8 bytes, the second group of 4 bytes is padded with zeroes, therefore a 47x47 is stored in the same amount of bytes than a 64x47 (and the same as 63x47,62x47…33x47 too) which is 378 bytes, the size of the 752 hex code.
HalosCodeImage.bmp (438 Bytes)

For an XOR OTP we will need a 376-byte keystream. It’s possible that a 376-byte block could have been picked from a random position within the data, so the size of the data isn’t really an issue. But in order to solve/decode it, we would have to do a so-called sliding-window-scan on the data. Maybe this is what “seek code out” means (that is if it didn’t just mean seek out 0418/Code = Dr Horn).

So, the process is: extract 376 bytes from offset 0 of the data, XOR byte for byte with the HALOS code and check for readable text. If the result is still gibberish, move on to offset 1 and repeat.

I found a tool that does exactly this: https://code.google.com/p/otpxor/

I believe it was used extensively by the Cicada 3301 solvers for some of the puzzles they were dealing with.

How about converting to 8-bit greyscale where each pixel is represented by a byte? But this would only work if there are enough shades in the image to yield the entropy we need.

EDIT:

IIRC, the last attempts that were discussed around that time were attempts to decrypt the code with TripleDES (3DES). But maybe we should seriously consider triple cascades of other ciphers. After all, one of the whiteboards does mention a triple cascade of AES-Twofish-Serpent, and triple cascaded ciphers are also mentioned in the PM 0418/Code/Storm sent to Guns. These are 128-bit block ciphers. What if we are dealing with a triple cascade of 64-bit block ciphers? But the number of possible cipher/mode combinations gives me a headache.

He also hinted that writing the storyline “might help”. But it’s not clear what he meant by this. He could have meant it might help the ARG by helping him develop the ARG further, or he could have meant that it might help us solve the current gateway puzzle. Perhaps it’s a little bit of both.

And what about the LOL Can message, a.k.a. the Tea Can… oops, sorry, the Tau Cannon message? Could it have been designed to remind us of the story of Dr. Horn and his colleagues and the the work they were doing at the BMRF? Could it be a hint for a possible passphrase?

That would be some serious work…
There’s a file, qescreen_noise001a.vtf, it’s a prop from QE.
If we are going to do this, we might as well start with that image, I did not check the entropy, but opening it with a hex editor you can see that it is pretty random, or so it seems.

Edit: Cascade ciphers, as you say, would be practically impossible to decrypt without any idea about the algorithms, the key, the mode, and the iv. There’s too many combinations with just one algorithm, with two or three…

I have the feeling that there’s more to the AI and the Niobium than the story and it might be directly related to the solution of the puzzle. After GunsRequiem (I think it was him) wrote a story on the wiki, storm wrote as an anonymous user that it was more a summary than a story. So he was really interested on it being complete. The only clues left by stormseeker that I would not trust completely are the messages he sent to Guns, he lied on them at least on some things, like the rainbow tables for AES. I guess he noticed that Guns new it was him.

Maybe the fact that he omited letters and left only the initials was the clue, we won’t know for sure till we solve the code. I checked several words on the whiteboards as passphrases, and nothing. I did not try Tea Cannon though :smiley:

Maybe writing everything together we will be able to see connections between the clues, the grilled pizza and the like. By the way, has anyone tried to put the 752code in the shape of the grilled pizza?

Yeah, I know. It seems as if every theory we have requires serious work, and maybe that’s why we’re struggling so much with it. Without solid leads it’s hard to justify spending the time needed to investigate and test a theory. But then again it wouldn’t be a real puzzle if we knew exactly what to do in order to solve it, even if it required a lot of work.

I agree, but my point is, we actually tried to solve the code for a long time, some people even wrote software to speed up the process, that’s hard work. While it’s true that if you know what to do from the start it’s not a puzzle, but a chore, we do not know anything, for every possibility tested another one seems to appear, and yes, they take time to test. I would like to think that it could be solved with minimal effort if you knew the process, and that finding the process to solve it is the difficult part.

The idea about the noise files is neat, I’m going to try it, but even if it’s a neat idea, is something pointing that it is the proper way to go? It could be argued that nobody had tried it when stormseeker said we were close.

Anyway, there are four files with the word noise on the BMS files, whitenoise.wav, qescreen_noise001a.vtf, detail_noise1.vtf and postprocess_noise.vtf; testing those files could be feasible with the software you found. But I’m pretty sure there are more files with noise on them even if they do not have it in their names. qescreen_noise001a.vtf seems to be the best bet, since it’s from QE chapter and was probably made by stormseeker. I’m going to try it, let’s see what comes out.

EDIT: I tried the four files, nothing. In case somebody wants to try, when the software searches it gives you the offset in Hex, but when you want to extract, you have to put the offset in decimal.

I searched for files with “screen” in the file name and found a few more textures with noise in them. Some of them are animated textures with several frames in them. This the list of files I have found so far:

am_console_screens03_2.vtf
am_tc_screens5.vtf
detail_noise1.vtf
dissection_array02_screens.vtf
labscreen4.vtf
lc_console_screens.vtf
marblenoise.vtf
postprocess_noise.vtf
qescreen_noise001a.vtf
tv_screen_on1.vtf
wallunit_display_screen5.vtf
white_noise.wav

I’m going to check them out, but I have to admit I’m already beginning to have doubts about this idea.

good grief it’s still going on? This stormseeker kid must be laughing his head off with the amount of time he’s wasted for everyone. Either you’re being royally trolled or he’s going for some kind of personal, bragging rights record of how long you can keep an ARG going because you’ve obviously not been given any useful hints. Move on people, the sun is shining outside. Put them out of their misery for goodness sake, this is just mean. There won’t be any elation when done now anyway, just blessed relief.

The fun is in the journey, not the end.

These guys wouldn’t have all these skills if they didn’t enjoy using them, reward or not.

are you… quoting yourself? :wink:

The man has a point, either we misunderstood all the clues, or there are more red herrings than clues. I still enjoy the puzzle, but I’ve been here for three months, not since the start.
I checked the files flavrans9 found to have noise. Yet again, nothing came out. We should try to narrow the possible methods to solve this to one or two, or at least get something really solid and continue from there.

Originally I was quoting it as a retort to Pop as he seemed to think it’s all in vain since there’s no reward, but I decided to reiterate the point. Guess I forgot to delete the quote. :retard:
Leaving it anyway.

Stormseeker’s Steam Profile Comments Analysis[/SIZE] or the difficulty of finding the right path to solve the code:

We will assume for this analysis that stormseeker did not lie at any point regarding the ARG progress, but that he could have tried to confuse the players in regards to the method needed to solve it (“How do you know solving this has anything to do with encryption? :freeman:”)

23-01-2013,07:09 - User: stormseeker
“[i]There will indeed be a conclusion to the ARG, when people have moved beyond the current gateway puzzle, but it might be a while before you get to it. :wink:

BM is still being worked on, nothing has been cancelled. Information isnt forthcoming at the moment due to the processes involved with Steam Greenlight, which limits what we can and cant say regarding the mod.[/i]”

Meanwhile, on the forums, that very same day…

https://forums.blackmesasource.com/showthread.php?t=13735&page=70

23-01-2013, 10:19 - User: Ysrael214
Bump, Bump, Bump. Stormseeker said you are near to the answer. Any updates?

It would be great to know if user Ysrael214 was told by stormseeker that the solution was close, or he interpreted the steam profile comment that way. I’m assuming that the comment made by stormseeker the twenty-third of January 2013 actually implies that the solution was not close.

13-05-2013, 12:47 - User: stormseeker
If it’s about the ARG, I’ve not set up or had any sites setup for hacking, so no. There is an answer, but you can’t brute force it, the CIA couldn’t brute force it. Someone is already close.

Analysis:[/SIZE]
Assuming that the solution was not close the twenty-third of January, and it was close the thirteenth of May, we can infer safely that one of the theories regarding the 752 Code developed during the time span between the two dates is, in fact, the one that will lead to the solution; and the only discussed theories are DES or 3DES encryption, taking into account that DES is easily cracked by the CIA, and storm said “…the CIA couldn’t brute force it…”, it would be safe to guess that 3DES or more advanced algorithms are the way to go.

Another interesting theory was posted by Gunsrequiem, keep in mind that even if it sounds farfetched, it was the last theory made before stormseeker said that someone was close, and the activity on the ARG thread was very low during that time.

https://forums.blackmesasource.com/showthread.php?t=13735&page=73

18-04-2013, 20:02 - User: Gunsrequiem
“…Granted, we correctly decoded the ASCII-85 text, yet were are having tons of trouble with the hexadecimal portion of the code–despite having various potential leads. One thing we’ve not considered is that the hexadecimal portion of the code may need to be shifted in some manner–for example, ROT-1 = rotate each input once…”

If the Hex Code had to be rotated, I would personally bet it is ROT-2, since the IP on the HALOS.txt message and in IRC clue 6 is 84.9.123.345, and in previous clues it was within range, below 255.

That’s everything that was discussed between the two dates on the ARG thread in regards to the 752 code. We know that Gunsrequiem was speaking through private messages with 0418/stormseeker, but we only know what 0418/stormseeker wrote, so maybe Gunsrequiem wrote something to 0418/stormseeker that made him write on his steam profile that somebody was near the solution.

Now, the Code is 3008 bits long, or 47 blocks of 64 bits. If we assume that a block cipher was used, it has to be a 64 bits block size encryption algorithm. Unless it was used in stream mode, with a message made up by 376 bytes to give the impression that it was a 64 bits block size algorithm.

Another possibility is that the message has some random bytes added as padding at the start and/or the end, to obfuscate the block size; the problem with this theory is that the padding should be recognizable so we could know where it starts and where it ends, possible “codemarks” for the padding could be the bytes 02 03 and 04, since those are the ASCII control symbols used on the grilledpizza.jpg solution, but after a quick look to the code it seems it is not the case, since there is no pattern to be found that would allow to dissect the code from these bytes:

B3 2B 00 3A 35 BA DD 66 57 7C 24 C1 4F C9 19 06 43 46 D1 31 A7 C5 4B B8 2F FE [COLOR=‘Yellow’]03 E0 22 61 57 77 24 79 23 DC 21 F6 2C D4 18 2E 91 C3 B2 67 B5 45 AB CA ED AF [COLOR=‘Lime’]02 61 51 0D 4E EA 1E 87 CD 33 C7 C7 71 31 30 9C C4 28 0E B4 24 3D 11 54 F0 44 F9 CF 62 96 D9 BF F7 39 7E 43 90 98 7F E6 32 [COLOR=‘Yellow’]03 DA 0D E4 [COLOR=‘Lime’]02 78 B3 A5 4F 5D DC 69 75 FA [COLOR=‘Cyan’]04 F7 49 84 9E 1A 62 59 5A 9F 63 0B 07 95 91 3D E0 15 3E 3A AC 38 8C 45 FB 9D 85 0C FE 91 35 41 D6 C0 83 98 F2 C8 83 32 A8 2F DF 00 28 1D 62 FC DC 4F E7 E4 6A E9 0C 51 C5 C8 06 B4 11 64 E3 3A B9 2C 96 86 2E 06 8B 0C 16 C0 99 90 B8 38 1A 00 DA 79 15 B6 7F E4 A2 0F 59 9B 0F 1B 6D 48 19 13 C7 B9 53 8C EE 63 91 44 F4 15 61 BA 92 E4 FE 75 1D 1E 24 2C D8 8F 51 D6 95 51 98 87 13 6A 7C 15 AA BD 7B 40 [COLOR=‘Cyan’]04 49 22 01 41 30 A9 1F 17 0F 66 CC B3 C1 39 46 3A 7E 90 9A 37 AA 86 3F B2 78 05 FC 97 31 C0 9C 8C 79 06 7E 79 93 0A 40 65 46 B2 4C 9A 62 9B 26 C2 CE 2A 4B E4 8F 58 9A 37 5F EB 73 1F C4 AB 22 5C 11 84 8C F8 9E 29 1F B2 71 33 97 0C 06 36 18 47 4A 89 28 01 ED D6 8F 54 69 8C 5E 5B 50 67 46 F6 76 5A 6F 7F 12 25 DE A4 DA 11 40 FE B6 0F 65 07 45 24 1C 69 36 95 88 3D CB 21 E6 FB FE FB B8 5A 29 91 94 80 36 A5 2B 5D

TL;DR:[/SIZE]

Someone is already close” – stormseeker

This could mean that 3DES is actually the way to decrypt the 752 Code, or that the step from DES to 3DES is in the right direction, and therefore the next logical step should be to try AES (as it was tried, in fact). So trying again to decrypt the code with OpenSSL with different passwords and modes, limiting the amount of algorithms to those directly related to 3DES and AES, to save time, could be a good idea.

Excellent post!

I think Ysrael214 was simply referring to Storm’s comment about being close.

I don’t know if it will help, but some things that Storm said to me, and I to him, when I wasn’t 100% sure it was him:

To Storm/0418:

[b]"“Seek out code he is watching”

Code_,

I previously mentioned that the “seek out Code_ he is watching” message may have pertained to you, but I never went through with actually attempting to do so. On a whim, and after reviewing the lack of progress while I have been preoccupied with school, I decided to message you and see if you have any correlation with the ARG.

I refuse to give up until I see this thing put to bed, and I’ll pursue all venues and investigate as much as possible while I have time this summer in an attempt to see it through.

You’ve been a stellar help in the past, and I only hope you can continue to be.

~Gun"

"Hey Code,

I have been trying some of the methods you mentioned in your last message–it appears as though many people are assuming that the message is encoded via 128-bit or 256-bit encryption, and I’d have to agree. I found a decent site that allows the decryption of a single block of data via multiple ciphers:

https://www.bierkandt.org/encryption/…encryption.php

I can’t be sure how accurately it’s coded, but it seems to generate correctly. I have been attempting random words that I think of (Dante, satan, lies, drhorn, pizza, etc.) and utilizing basic ECB format. Of course, I have no way of knowing how Storm encoded it, but that seems to be the most plausible selection.

Despite this, I’ve begun to wonder if the encryption method is not as important as determining what the key is. We have so much viable information out there, it’s become almost impossible to distinguish what key would bear fruit.

Another idea I have is that when Storm says "Seek code out . . . ", there may potentially be another side code that we have yet to discover. It seems possible considering the vast amount of hints and misdirections we’ve uncovered.

Anyway, I value your thoughts and opinions, so I hope to hear from you when you get time. Take it easy, man!

~Gun"
[/b]
Storm/0418 to Me:

[b]"“some secret project we dont have the access levels to get at”

That bit stands out the most, and I think is likely directly linked to whatever is in rooms X01 and X02.

Macroscale Quantum Systems could relate to anything that uses quantum mechanics for a larger purpose.

We’ve heard stuff about Niobium a few times, and it’s used in super conductive alloy, so I would assume some kind of Quantum computer system, probably an AI, perhaps under the name of HALOS."
[/b]

EDIT: Just as a side note, I remember in the beginning of the ARG when the IRC channel was highly populated that Code/Storm mentioned something that stuck with me. He noted another ARG in another game that was left unsolved (I think) and had some ridiculously meticulous puzzles. For instance, he said that in one level cockroaches on the ground ran in a pattern, and unless you knew how to note the pattern and then decode the pattern to produce letters, it was nigh impossible to figure out. With that said, and with what we know about how intricate and precise Storm’s clues and work with the game have been, I think we may be in for a considerable challenge. The man has a history with this kind of stuff, so hold on to your hats :slight_smile:

Founded in 2004, Leakfree.org became one of the first online communities dedicated to Valve’s Source engine development. It is more famously known for the formation of Black Mesa: Source under the 'Leakfree Modification Team' handle in September 2004.