It would be neat to do this with a computer so that at the end you have binary code which gives you a bitmap, or better yet you get a black 'n white video in just high enough quality for what it is needed for, and, if is even kind of compressed and with sound similar to mono.
Cool. Very handy information. It seems like the hard (risky) part would be delivering / receiving the pad more so than creating the randomized pad. I don't have anything to say that would warrant the use of a one time pad but I can see the need in understanding how to use it :)
The Galaxy Cipher Machine: Calico encryption. An unbreakable cipher machine for secure short communications, and for coding passwords to access larger data files. With each rotation of the discs, and replacing of the set discs, gives another password segment (and which segment it is in the order). Together they are safely used for the full password. A method called CALICO password. Or before each disc shift you are given a password and the number representing it. After the full decode you may have seven passwords, for seven password requests. You enter the first password that would usually give you the information, but instead it asks for another password, then another, until all seven are entered and you are given the information. Each password has at least 30 letters in it to further decrease the possibility of being decoded by a spying party. Set up: A disc cipher machine on a spindle, the discs are like checkers in that they have notches to fit into each other. 1st wheel is the set disc with the numbers 1-80 scrambled, etched around the side, and on the top edge are three alphabets, scrambled the same, with two empty spaces to make 80 digits around the top. Each letter on the top is over a number on the side. There are 26 body discs, each having two rows (top and bottom) of 1-80 on their sides. The first message is a four number code: 1234. This is first a security check. The number 23 on the disc, 4 to the right, plus 1, gives you the security response. For the set up: The number one represents which set disc is to be used. The 23 is the number on the set disc that is under the letter on the top "E". This letter is the first body disc to be put on the spindle under the set disc. Depending on what the users invented for themselves, an even number goes left, odd/right. So the order of the body discs is the E first, then of right for the rest of the letter order for the discs. The body discs are like checkers in that they have notches for them to fit into each other. There is a dot on the bottom of the set disc somewhere between two numbers, and a dot on each side of each body disc as well. The last number of the 1234, the 4, is how many (left or right) notches to shift the discs as they are being put on using the dots as beginning points. 4 was invented to mean right for the dots so each disc has their dots spaced 4 notches to the right of the one above it. It is also decided/invented which discs go on up-side down. Once all discs are in place a tightening bolt is screwed on the spindle to secure the discs. Operation: In the coded message sent, the first 30 numbers are still part of the set up. The message follows after them. In these 30 numbers you have invented the pattern that if there are two number 6s in the 5th, 13th, 18th, and 29th numbers, the message is authentic. If there are more or less than two number 6s the message is bogus and is disregarded. In the first 30 numbers, you take the 4th and 9th numbers to know which algorithms to use, in this case both numbers are 12,34. You have invented at least 10 algorithms. The first message letter is O. Find an O on the top of the set disc in one of the alphabets (using another alphabet for the next O), and go down to the number below it on the edge, say 57. Now the first four algorithms are made up by the two users of the machines so they can be anything their imaginations can come up with. Like, from 57, down five discs to the top row of 1-80 where the number is 32, find 32 on the bottom row and go down 7 more discs and do the same, then go straight up to the set disc. 2nd algorithm is a diagonal angling down to the right 8 discs to the lower number on that disc-46, then finding the 46 on the top row, and straight up the to the top set disc. 3rd algorithm is another imaginative pattern ending at the top number 78 on the set disc. 4th algorithm now has a sleeve that fits over the machine with holes randomly drilled into its side lining up with each disc's number lines, 15 holes per line. Now look again to the first 30 numbers and see the 18th and the 62nd numbers are 36, and 84. So now the 78 is lined up with the 3rd disc's top number 6 hole, this shows the number 69 in the bottom number row hole 8. This continues for 4 discs to the last number 51 that is sent in to the other communicating person. (36, 84 is third disc, holes 6 and 8, for 4 discs)They run it all backwards to find the letter O. Throughout the sent message there are many OOs. The pattern invented is that you go six numbers beyond the OO to see if there is a number 5 in that number (75). If there is, you know it is a body disc shift. The other number is how many notches to shift each dot.(Odd numbers one way, even the other). Do this at least once every message. If there is a 2 in that number (27) it means to replace the set disc with another one, in this case the number 7 set disc. You replace the old one and just line up the dots of the new set disc directly over the dot beneath it on the first body disc. Do this at least once every message for both set and body discs. Another code invented tells you to change the entire order of the set up with a 4 digit set up number following it. Golden rules: 1) Never use the same set up code more than once. 2) Always send at least 15 phony messages for every one authentic message. 3) Always shift both the set disc and body discs at least once every message. This cipher machine has ever changing/shifting number patterns, an infinite number of invented algorithms that are used in different orders, a large number of 4th algorithm repeats, and every set of machines has a different operation. Each operating set of machines have virgin discs no other machines have. This cipher machine cannot be broken, not even by the largest computers in the world if used correctly. The confirmation that a code has been broken is that the message appears. With a 500 letter message, if 500 GCMs are used where each machine only encrypts one letter, there is no confirmation the letter that comes up when trying to break it is the actual letter that is in the message. Every letter has a machine with different discs, different algorithms, and different operators encrypting it. So the most any attempt to break the code can do is acknowledge that each letter position could be any of the letters in the entire alphabet (A-Z). To write out the possibilities on paper would be to have an entire alphabet under letter position #1, then another one under #2, an so on. In the end there would be 500 alphabets in a row as the only clue to what the message says. Its like telling the hackers there are 500 letters in the message and the words are in the dictionary. With this small bit of information it is IMPOSSIBLE to even begin to try to find the message. Not even the biggest computer in the world, working on it for 10,000 years could find the message. This encryption form is called CALICO ENCRYPTION, it is unbreakable, and is perfectly suited for the Galaxy Cipher Machine.
A friend of mine and myself set up a system where we both had a book and we could create messages based on page number, line number, word number and letter number i.e page 3, line 4, word 5, letter 3. The message would be sent as '3453' and so on. We just did this via skype for a laugh.
Hi. For sure is going to work, but you need to add complexity, because, 231265 could be page 23 line 12 word 6 letter 5, but also page 231 line 2 word 6 letter 5. 73!
4:08 yes yes 13-6 = 7 so message has H. same thing as ceasar cipher with key "word" and it change every letter for new key in this you have keyword GEXOI. same thing as have A-Z on paper and when key is G you move that G under A. right away you see H and under N this works exactly same. and when you encode your message encode it again with different key. that actually mean you encode it one key bcoz it just add keys together meaning if you encode with code MOTHER and then encode again FATHER. easy remember but its same as encode one time with ROWOII
Thanks Gil for the information and a bit of history lesson from the past =) YES .... a note to all "NEVER NEVER NEVER SEND ENCRYPTED MESSAGES ON THE RADIO ! ! ! ! !" Just do not do it ! ! ! ! ! Have fun playing with friends though =)
I remember doing this in school with friends =) That way if you where caught by the teacher you where ( well the other person passing the message ) would be the only ones getting in trouble and no one except you and the group would know what it said 8-) Just like the TV show in America " Mission Impossible" and "Man from U.N.C.L.E. " =)
If I wanted to send unbreakable radio signals I'd just use AES-256 equipped radios and eliminate the need for slow manual encryption/decryption as if we are living in 1940's Germany. Radios loaded with a random 32 byte key from a secured KVL is about as secure as one can get.
I am a programmer, i builded secret chat messaging service with compiled world into the numbers but my message has secret key hidden between numbers, and its random placed every time plus number is not the same for one world. Hello first time will be 4200542638570820000036 and next hello will be 14005809314830000024 Now, i building algorithm to send and recieve only blank spaces, like "00000000000" in the perfect format of empty walues and algorithm will got that length and produce the second par, then devide by -1 until the end, and build the pair-unpar string for next compiling process. Its challenging, but i will make it... 😁 i love to play braing games a lot.
Ok. This method gets a little tedious with any message of length. If we are using pen and paper, setting up a Vigenere square would speed up the cipher/ deciphering process. Also, the complexity of managing one time pads over a cipher net (more than two people talking and listening) is a bit of a pain which, although the use of one time pads was well understood by the start of the 20th century, it was never put into large scale practice. Why do you think the Germans used an enigma machine and the allies used M-209 converters? Both those machines are, in theory, perfectly secure. In practice, sloppy technique and high volume of traffic led to the breaking of the system. What do you do if your one time pad is compromised by one member of the net? The cardinal sin of a one time pad is using is more than once. Two messages sent with the same one time pad are rather easy to break. The sending and receiving of ciphers is rather more complex than at first glance. Once you get into real world application, trouble starts, and although one time pads can work, they often don’t. The willingness and ability of the cryptanalyst is also important. Just as you pointed out, even morse code alone could be secure enough against unsophisticated foes. If you really want to set up a cipher net to use in the event of a prepping situation, something a bit more sophisticated than one time pads would be required, and no cipher net is secure unless the participants practice strict cipher discipline - something probably beyond the ability of most groups of rag tag survivors.
+crbrelativity Good points. There are many ways to encrypt messages. I hope this video will be a primer for many who will then explore other ciphers or coding methods.
Absolutely! I don’t mean any criticism. I am a big fan of your channel and your videos inspire me every time. Because if you I’m building another radio right now. What I always crave in your videos and in OH8STN is context. You have introduced an interesting skill, marvelous. But when and how would I use it? In theory I could use it in certain situations, but I encourage you to take the next step and work out the details. In this case, I believe, you will find that what you presented is not a viable solution to a need for secure communication. I consider you an expert on portable radio operations. Someone could watch all your videos, but you would agree that unless he or she packs up and actually tries it - they really don’t understand the problems and complexities. Unless you have really tried to send and receive a one time pad, and then tried to get multiple people organized into a secure cipher net, you have no idea of the complexities involved. In the end, you are left with a false sense of ability and security. Once again, I’m a big fan and hope you take this critique is good spirits. Charlie KM4ZZ
+crbrelativity I will certainly try to do more practical operations. Cold weather isn't a good excuse. Encryption though is particular because doing it on the air is illegal. I Don't see encryption as a regular thing to do. In most cases it would not be necessary. It is just a good thing to know on the off chance that it would be needed. Not something I plan on developing. I think more videos in the field under various conditions would be good...
You are right Gil =) The human brain is very adaptable and uniquely inventive; much more than the logically programmed computer or machines =) I like the TV show "NUMBERS" as a good mathematical way to look at things .... I know it is entertainment TV ... the principals are good and inventive =)
@crbrelativity -- OTPs are the province of professional operators and were heavily used in one way (broadcast) systems when talking to clandestine operators in the field. Key materials can be easily distributed with a little thinking outside the box and training an operator to decode OTP traffic is trivially easy if he can add and/or subtract. When you have a large network of operators passing CW in both directions OTPs can become somewhat tedious and they tended to be relegated to highly sensitive traffic such as diplomatic traffic and traffic between fixed stations where the communications resources are more complete (you have a shop dedicated to encryption/decryption). I'd be interested in hearing what experience you have had on "secure cipher nets" that would make you believe that OTPs are less desirable than a cipher system invented in the 15th century. I would also be interested in what real world experience you have to make you believe either Enigma (the original Unix password system was based upon Enigma BTW) or the M-209 are any easier to use or even remotely as secure as a OTP? If you would like to see an interesting, and very secure system which is in the public domain and which can be downloaded and put easily into service have a look here: github.com/micers/Chaffer
I don’t think this is unbreakable as to decrypt the code all you would need the original message and the encrypted message. You can assume some parts of the original message for example if you assume that they end their message with ‘Bye’ and you know that the encrypted message is ‘E Z J’ you can work out that the key they are using is C A E
6:40 yep. no counting if make bigger and smaller ring with A-Z and rotate inner ring G to A. you see inner ring N is position H thats how you encode and decode. now you can think even more better. make another inner ring reverse Z-A and switch every letter normal and reversed or even shuffeled but it actually is same as replace it key that not mean anything and receiver need same shuffled alphas. its easy this way and same safe. and can be cracked. this is how you crack it xD only need find XEROI if know you are using ceasar. all 5 combo a-Z secret code can be permunated on python, but 6 letter you get memory error LOL there is 403291461126605635584000000 plausable combo in alpha A-Z if you shuffle them i not want even count how much disc space it would need simple answer would be 403291461126605635584000000*26bytes = 10^14 terabytes = 100 000 000 000 00*10TB disc. yup lets forget it LOL
Brute force will produce every possible combinations of letters. You might as well generate random ones, no need to use the intercepted code. One-time-pads are unbreakable if the key is truly random and used only once, period.
Welcome to the world epsionage and the facination of the number stations.:)
This could be in top 100 most useful videos list on my entire youtube life
Watch the one I made on the confusion about end-fed antennas ;-)
@@RadioPrepper i watched it and it was very helpful too. thanks
It would be neat to do this with a computer so that at the end you have binary code which gives you a bitmap, or better yet you get a black 'n white video in just high enough quality for what it is needed for, and, if is even kind of compressed and with sound similar to mono.
Incredible video, thank you for showing the method
Cool. Very handy information. It seems like the hard (risky) part would be delivering / receiving the pad more so than creating the randomized pad. I don't have anything to say that would warrant the use of a one time pad but I can see the need in understanding how to use it :)
THANK YOU
Very cool. Thanks Gil.
Very cool! Thanks for this.
The Galaxy Cipher Machine: Calico encryption.
An unbreakable cipher machine for secure short communications, and for coding passwords to access larger data files. With each rotation of the discs, and replacing of the set discs, gives another password segment (and which segment it is in the order). Together they are safely used for the full password. A method called CALICO password. Or before each disc shift you are given a password and the number representing it. After the full decode you may have seven passwords, for seven password requests. You enter the first password that would usually give you the information, but instead it asks for another password, then another, until all seven are entered and you are given the information. Each password has at least 30 letters in it to further decrease the possibility of being decoded by a spying party.
Set up:
A disc cipher machine on a spindle, the discs are like checkers in that they have notches to fit into each other. 1st wheel is the set disc with the numbers 1-80 scrambled, etched around the side, and on the top edge are three alphabets, scrambled the same, with two empty spaces to make 80 digits around the top. Each letter on the top is over a number on the side. There are 26 body discs, each having two rows (top and bottom) of 1-80 on their sides.
The first message is a four number code: 1234. This is first a security check. The number 23 on the disc, 4 to the right, plus 1, gives you the security response.
For the set up: The number one represents which set disc is to be used. The 23 is the number on the set disc that is under the letter on the top "E". This letter is the first body disc to be put on the spindle under the set disc. Depending on what the users invented for themselves, an even number goes left, odd/right. So the order of the body discs is the E first, then of right for the rest of the letter order for the discs. The body discs are like checkers in that they have notches for them to fit into each other. There is a dot on the bottom of the set disc somewhere between two numbers, and a dot on each side of each body disc as well. The last number of the 1234, the 4, is how many (left or right) notches to shift the discs as they are being put on using the dots as beginning points. 4 was invented to mean right for the dots so each disc has their dots spaced 4 notches to the right of the one above it. It is also decided/invented which discs go on up-side down. Once all discs are in place a tightening bolt is screwed on the spindle to secure the discs.
Operation:
In the coded message sent, the first 30 numbers are still part of the set up. The message follows after them. In these 30 numbers you have invented the pattern that if there are two number 6s in the 5th, 13th, 18th, and 29th numbers, the message is authentic. If there are more or less than two number 6s the message is bogus and is disregarded. In the first 30 numbers, you take the 4th and 9th numbers to know which algorithms to use, in this case both numbers are 12,34. You have invented at least 10 algorithms. The first message letter is O. Find an O on the top of the set disc in one of the alphabets (using another alphabet for the next O), and go down to the number below it on the edge, say 57. Now the first four algorithms are made up by the two users of the machines so they can be anything their imaginations can come up with. Like, from 57, down five discs to the top row of 1-80 where the number is 32, find 32 on the bottom row and go down 7 more discs and do the same, then go straight up to the set disc. 2nd algorithm is a diagonal angling down to the right 8 discs to the lower number on that disc-46, then finding the 46 on the top row, and straight up the to the top set disc. 3rd algorithm is another imaginative pattern ending at the top number 78 on the set disc. 4th algorithm now has a sleeve that fits over the machine with holes randomly drilled into its side lining up with each disc's number lines, 15 holes per line. Now look again to the first 30 numbers and see the 18th and the 62nd numbers are 36, and 84. So now the 78 is lined up with the 3rd disc's top number 6 hole, this shows the number 69 in the bottom number row hole 8. This continues for 4 discs to the last number 51 that is sent in to the other communicating person. (36, 84 is third disc, holes 6 and 8, for 4 discs)They run it all backwards to find the letter O.
Throughout the sent message there are many OOs. The pattern invented is that you go six numbers beyond the OO to see if there is a number 5 in that number (75). If there is, you know it is a body disc shift. The other number is how many notches to shift each dot.(Odd numbers one way, even the other). Do this at least once every message. If there is a 2 in that number (27) it means to replace the set disc with another one, in this case the number 7 set disc. You replace the old one and just line up the dots of the new set disc directly over the dot beneath it on the first body disc. Do this at least once every message for both set and body discs.
Another code invented tells you to change the entire order of the set up with a 4 digit set up number following it. Golden rules: 1) Never use the same set up code more than once. 2) Always send at least 15 phony messages for every one authentic message. 3) Always shift both the set disc and body discs at least once every message. This cipher machine has ever changing/shifting number patterns, an infinite number of invented algorithms that are used in different orders, a large number of 4th algorithm repeats, and every set of machines has a different operation. Each operating set of machines have virgin discs no other machines have.
This cipher machine cannot be broken, not even by the largest computers in the world if used correctly. The confirmation that a code has been broken is that the message appears. With a 500 letter message, if 500 GCMs are used where each machine only encrypts one letter, there is no confirmation the letter that comes up when trying to break it is the actual letter that is in the message. Every letter has a machine with different discs, different algorithms, and different operators encrypting it. So the most any attempt to break the code can do is acknowledge that each letter position could be any of the letters in the entire alphabet (A-Z). To write out the possibilities on paper would be to have an entire alphabet under letter position #1, then another one under #2, an so on. In the end there would be 500 alphabets in a row as the only clue to what the message says. Its like telling the hackers there are 500 letters in the message and the words are in the dictionary. With this small bit of information it is IMPOSSIBLE to even begin to try to find the message. Not even the biggest computer in the world, working on it for 10,000 years could find the message.
This encryption form is called CALICO ENCRYPTION, it is unbreakable, and is perfectly suited for the Galaxy Cipher Machine.
A friend of mine and myself set up a system where we both had a book and we could create messages based on page number, line number, word number and letter number i.e page 3, line 4, word 5, letter 3. The message would be sent as '3453' and so on. We just did this via skype for a laugh.
+VK6OP Certainly much faster and good enough for casual privacy.
Hi. For sure is going to work, but you need to add complexity, because, 231265 could be page 23 line 12 word 6 letter 5, but also page 231 line 2 word 6 letter 5.
73!
dont even know why i'm watching this, but this was fun! love it
You are infected with the Morse variant! Now you have to learn it...
@@RadioPrepper lol
4:08 yes yes 13-6 = 7 so message has H.
same thing as ceasar cipher with key "word" and it change every letter for new key in this you have keyword GEXOI. same thing as have A-Z on paper and when key is G you move that G under A. right away you see H and under N this works exactly same.
and when you encode your message encode it again with different key. that actually mean you encode it one key bcoz it just add keys together
meaning if you encode with code MOTHER and then encode again FATHER.
easy remember but its same as encode one time with ROWOII
Thank you.
Very helpful!
Awesome one but need more details such as adding space symbols
just increment the alphabet with your extra characters. Space would be position 26 in the alphabet and so on.
The numbers, Mason! What do they mean?!
Thanks for this Gil. This is actually incredibly useful information.
73
Julian oh8stn
+OH8STN Thanks Julian. I need to get outside for field operations though!
Thanks Gil for the information and a bit of history lesson from the past =) YES .... a note to all "NEVER NEVER NEVER SEND ENCRYPTED MESSAGES ON THE RADIO ! ! ! ! !" Just do not do it ! ! ! ! ! Have fun playing with friends though =)
+Pat Hopkins Basically for information purposes only!
I remember doing this in school with friends =) That way if you where caught by the teacher you where ( well the other person passing the message ) would be the only ones getting in trouble and no one except you and the group would know what it said 8-) Just like the TV show in America " Mission Impossible" and "Man from U.N.C.L.E. " =)
+Pat Hopkins I found this method in the "Cryptonomicon" novel.
Radio Prepper did you ever try using the deck of cards method described in the book?
+Run Lift Throw No. It was years ago, I should read it again since I don't remember that method...
Cool video. Thank you.
Would be funny to try to travel with a Paraset and a OTP booklet in the cabin suitcase. lol!
LOL, and tiring!
Great video as always!
If I wanted to send unbreakable radio signals I'd just use AES-256 equipped radios and eliminate the need for slow manual encryption/decryption as if we are living in 1940's Germany.
Radios loaded with a random 32 byte key from a secured KVL is about as secure as one can get.
Kool!
I thought the point of sending an encrypted message is in hope it CAN be uncrypted on the other end, not being ‘unbreakable’.
Unbreakable without the key!
Or just use an enigma machine and another one so no computer can guess the right message
Your all videos are absolutely amazing. 73 de Darek SQ7HJE
Thank you!
I am a programmer, i builded secret chat messaging service with compiled world into the numbers but my message has secret key hidden between numbers, and its random placed every time plus number is not the same for one world. Hello first time will be 4200542638570820000036 and next hello will be 14005809314830000024
Now, i building algorithm to send and recieve only blank spaces, like "00000000000" in the perfect format of empty walues and algorithm will got that length and produce the second par, then devide by -1 until the end, and build the pair-unpar string for next compiling process. Its challenging, but i will make it... 😁 i love to play braing games a lot.
I cont understand there "-15+26 " why 26 where it is come from ? Is it mean 26 alphabet ?
I "cont" XD😂
Ok. This method gets a little tedious with any message of length. If we are using pen and paper, setting up a Vigenere square would speed up the cipher/ deciphering process. Also, the complexity of managing one time pads over a cipher net (more than two people talking and listening) is a bit of a pain which, although the use of one time pads was well understood by the start of the 20th century, it was never put into large scale practice. Why do you think the Germans used an enigma machine and the allies used M-209 converters? Both those machines are, in theory, perfectly secure. In practice, sloppy technique and high volume of traffic led to the breaking of the system. What do you do if your one time pad is compromised by one member of the net? The cardinal sin of a one time pad is using is more than once. Two messages sent with the same one time pad are rather easy to break. The sending and receiving of ciphers is rather more complex than at first glance. Once you get into real world application, trouble starts, and although one time pads can work, they often don’t. The willingness and ability of the cryptanalyst is also important. Just as you pointed out, even morse code alone could be secure enough against unsophisticated foes.
If you really want to set up a cipher net to use in the event of a prepping situation, something a bit more sophisticated than one time pads would be required, and no cipher net is secure unless the participants practice strict cipher discipline - something probably beyond the ability of most groups of rag tag survivors.
+crbrelativity Good points. There are many ways to encrypt messages. I hope this video will be a primer for many who will then explore other ciphers or coding methods.
Absolutely! I don’t mean any criticism. I am a big fan of your channel and your videos inspire me every time. Because if you I’m building another radio right now.
What I always crave in your videos and in OH8STN is context. You have introduced an interesting skill, marvelous. But when and how would I use it? In theory I could use it in certain situations, but I encourage you to take the next step and work out the details. In this case, I believe, you will find that what you presented is not a viable solution to a need for secure communication.
I consider you an expert on portable radio operations. Someone could watch all your videos, but you would agree that unless he or she packs up and actually tries it - they really don’t understand the problems and complexities.
Unless you have really tried to send and receive a one time pad, and then tried to get multiple people organized into a secure cipher net, you have no idea of the complexities involved. In the end, you are left with a false sense of ability and security.
Once again, I’m a big fan and hope you take this critique is good spirits.
Charlie KM4ZZ
+crbrelativity I will certainly try to do more practical operations. Cold weather isn't a good excuse. Encryption though is particular because doing it on the air is illegal. I Don't see encryption as a regular thing to do. In most cases it would not be necessary. It is just a good thing to know on the off chance that it would be needed. Not something I plan on developing. I think more videos in the field under various conditions would be good...
You are right Gil =) The human brain is very adaptable and uniquely inventive; much more than the logically programmed computer or machines =) I like the TV show "NUMBERS" as a good mathematical way to look at things .... I know it is entertainment TV ... the principals are good and inventive =)
@crbrelativity -- OTPs are the province of professional operators and were heavily used in one way (broadcast) systems when talking to clandestine operators in the field. Key materials can be easily distributed with a little thinking outside the box and training an operator to decode OTP traffic is trivially easy if he can add and/or subtract.
When you have a large network of operators passing CW in both directions OTPs can become somewhat tedious and they tended to be relegated to highly sensitive traffic such as diplomatic traffic and traffic between fixed stations where the communications resources are more complete (you have a shop dedicated to encryption/decryption).
I'd be interested in hearing what experience you have had on "secure cipher nets" that would make you believe that OTPs are less desirable than a cipher system invented in the 15th century. I would also be interested in what real world experience you have to make you believe either Enigma (the original Unix password system was based upon Enigma BTW) or the M-209 are any easier to use or even remotely as secure as a OTP?
If you would like to see an interesting, and very secure system which is in the public domain and which can be downloaded and put easily into service have a look here: github.com/micers/Chaffer
Interesting
Its a very nice video but i didnt understood how i would write sentences?
Hi, one letter at a time, in your head or on paper..
I don’t think this is unbreakable as to decrypt the code all you would need the original message and the encrypted message. You can assume some parts of the original message for example if you assume that they end their message with ‘Bye’ and you know that the encrypted message is ‘E Z J’ you can work out that the key they are using is C A E
If you have the original message you don't need to break it... And yes, it is unbreakable because the coded message is random.
Watches The Imitation Game once...
Do we always use GEXOJ?
No, use random characters.
That's the unbreakable part. Completely random key.
OTP++ there's more than one way to skin a cat my friend.
Definitely.
6:40 yep. no counting if make bigger and smaller ring with A-Z and rotate inner ring G to A. you see inner ring N is position H thats how you encode and decode.
now you can think even more better. make another inner ring reverse Z-A and switch every letter normal and reversed or even shuffeled but it actually is same as replace it key that not mean anything and receiver need same shuffled alphas. its easy this way and same safe. and can be cracked. this is how you crack it xD
only need find XEROI if know you are using ceasar. all 5 combo a-Z secret code can be permunated on python, but 6 letter you get memory error LOL
there is 403291461126605635584000000 plausable combo in alpha A-Z if you shuffle them
i not want even count how much disc space it would need
simple answer would be
403291461126605635584000000*26bytes = 10^14 terabytes = 100 000 000 000 00*10TB disc.
yup lets forget it LOL
Reeeeeeeeeeeeeewweweweeeeweweeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee
Why?!
Why
I pooped
I love My cats ok
R/yougpeopleyoutube
I
E
Agent Gil. hehe :)
+Jan mo LOL, maybe I'll get hired ;-)
No it is not, because it is random.
@@RadioPrepper Even with quantum computers ?
I don't see how, but I am not a quantum physicist...
Woah, crazy!
This is not unbreakable, can easily be cracked with "brute force" and a computer until some sensible readable words show up in clear.
Actually no.
Brute force on one time pads will generate a lot of sensible readable words, so much that it becomes rather impossible to know the correct words.
Time pad is not breakable if the pad is truly random, period.
Brute force will produce every possible combinations of letters. You might as well generate random ones, no need to use the intercepted code. One-time-pads are unbreakable if the key is truly random and used only once, period.