Agreed.
I’ve been messing around with the HALOS file and the 21 into 1 clue recently. Here’s what I’ve got on 21 into 1.
If you divide 21 by 1, you get this: 0.04761904761
It may not seem like much, but a little Googling brought me across this tweet from @EthanDChung
This quote seems to tie into another interesting clue that was noted with 21 into 1:
The date 12/21/12 coincides with a fun date about the (supposed) end of the world.
Bringing that back around to HALOS, the start of the end is a base point for something. Perhaps a key, salt or IV. That brought me around to building a aes-256-cbc brute-force program in Go, starting with the key “BENALOHPAILLIER” and the IV 0.0476… converted into UNIX epoch. The reason for using epoch is that it’s a 32-bit integer. The key has to be padded so that it consumes the same bit space as the epoch.
I did try multiple combinations of the key, upper, lower case, putting a space in-between, and multiple permutations of that formula. I had this with very, very, very little success only gaining 1 char of ASCII output. Please note, I ran this in a loop incrementing the IV by 1 over the effective period of 2 years.
In addition, I did try using the BENALOH key as the IV and the epoch as the key, but again with the same outcome as before.
It’s also important to note I did try converting the epoch between Big & Little Endian before stopping my attack.
The reason I did not start with aes-128 is that it’s theoretically breakable and it was noted by Storm that this couldn’t be broken by anyone of importance. That doesn’t mean it isn’t worth trying, it’s just that I haven’t done it yet.
I plan on giving my Go brute-forcer another pass, because I’m not settled that everything was converted into bytes correctly. I’m a pretty skilled software dev, but this was my first time with Go and I think I could do better.
Thoughts? Also, to the community, if there is interest I will post my code on GitHub and allow PRs to improve the quality of our attacks. Just let me know…