Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Obama administration’s calls for backdoors into encrypted communications echo (1990s) fiasco
MacDailyNews ^ | December 14, 2015

Posted on 12/14/2015 8:52:46 PM PST by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-31 last
To: The Duke

One time pads, as long as the “pads” remain secure, simply cannot be broken. Therein lies the trick though, getting sufficiently large pads (ie. files of random data) securely in both (all) parties hands and keeping them secure. There are some relatively simple procedures for this, but not necessarily easy/convenient procedures...


21 posted on 12/15/2015 8:07:56 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: 109ACS; aimhigh; bajabaja; Bikkuri; Bobalu; Bookwoman; Bullish; Carpe Cerevisi; DarthDilbert; ...
If you like your encryption, you can keep your encryption...or maybe not. - ANDROID PING!

Android Ping!
If you want on or off the Android Ping List, Freepmail me.

May have to look to open source solutions that implement known to be secure algorithms. But then you have to trust the source of the encoding program...or build your own. But you need to trust the hardware and OS you build it on and encode on... and so on, and so on...
22 posted on 12/15/2015 8:10:12 AM PST by ThunderSleeps (Stop obarma now! Stop the hussein - insane agenda!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: The Duke
Sounds like a variation of the one-time pad. One affect all this does have is bringing back the days of having to use human agents to transport keys/code books around.

The beauty of the system I described is that it allows digital transmission. . . and it is still secure. You can also send the same message to multiple recipients so long as they all have the same book, rules, and calendar. Only the recipients can decode it. . . and since it never repeats for character, word, or apparent message, it is totally un-decypherable.

23 posted on 12/15/2015 12:04:55 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Swordmaker; ThunderSleeps; The Duke
The physical distribution of one time pads is a problem if high volume traffic is required. Small unit or cell communications don't.

Strict one time pads I imagine are used only for high profile singular comm requirements.

Swordmakers idea eliminates the hard copy pad distribution without the pseudo random number generation of the past, as I gather that new methods approach truly random numbers now.

The San Bernardino shooters apartment had an interesting object. The wall hanging Islamic rug/tapestry.

At first I thought the matrix of the field was a repeating graphic of small diagonals, but a closer look reveals Arabic script that appears to vary. Add the comings and goings of strangers to the apart. How could one be sure of the identity of another agent? The rug has a matrix. of usable 200 cells, with and without script. I subtracted the central image.

It can then be used as a one time pad or point and speak a specific cell or series of cells , the locations set by any factor. Can also reference specific suryas of the Q'ran which have meaning.

Started thinking that using a matrix that has the identical symbol in each cell, that maybe a pad can be created. Taking the star field of the US flag as an example of identical symbols to which various cultural attributes might be ascribed, in this case order of admission, dates etc.

A poor example, I know, but fun to think about.

24 posted on 12/15/2015 12:54:56 PM PST by Covenantor (Men are ruled...by liars who refuse them news, and by fools who cannot govern - Chesterton)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Covenantor
The San Bernardino shooters apartment had an interesting object. The wall hanging Islamic rug/tapestry.

That's an interesting observation. It could indeed be a key for using a system similar to mine for passing coded messages. Each could be a passage in the Qu'ran which then indicates the starting page. Row and column indicate direction rules for the code number counts. Easy. . . and right in plain site.

25 posted on 12/15/2015 2:42:34 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue....)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Swordmaker

...in plain sight...with no paper or transmission trail.

Controller verbal->messenger->agent->point and say or die.


26 posted on 12/15/2015 3:01:37 PM PST by Covenantor (Men are ruled...by liars who refuse them news, and by fools who cannot govern - Chesterton)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Covenantor

That’s kind of interesting.

Not being picky or anything, but I count 198 cells, with or without the arabic text...not counting the top, larger, text or the central image. Who knows, might make a difference.


27 posted on 12/15/2015 3:04:26 PM PST by Beach333
[ Post Reply | Private Reply | To 24 | View Replies]

To: Beach333

That was meant to be 196.


28 posted on 12/15/2015 3:05:36 PM PST by Beach333
[ Post Reply | Private Reply | To 27 | View Replies]

To: Beach333

Working from the blurry photo, counted 8 across, 29 down, included blank ‘cells’; 29x8=232

Minus 4x8 center=32

Bi-focals and phone image could effect my count.

Showing my work, not that our count difference affects the general concept of the matrix


29 posted on 12/15/2015 3:13:33 PM PST by Covenantor (Men are ruled...by liars who refuse them news, and by fools who cannot govern - Chesterton)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Covenantor

Yeah, it really doesn’t matter for the concept, only if one were trying to actually decipher. Interesting idea.


30 posted on 12/15/2015 3:23:06 PM PST by Beach333
[ Post Reply | Private Reply | To 29 | View Replies]

To: dayglored
They can always resort to traditional means of decryption:
"Black-bag" decryption" -- being sneaky and using subterfuge rather than high-tech to gain the password.
"Rubber-hose decryption" -- beating the crap out of people until they give up the password.
These techniques are sufficient for all legally authorized government surveillance (most notably, someone refusing to provide files after being presented with a warrant can be held for contempt of court, which I suppose would be considered an example of a lawful "rubber hose" option).

The Feds want to sweep this fact under the rug, because relying on these options keeps them constrained. Planting bugs, reconstructing messages from electromagnetic noise, etc requires investments in manpower and equipment, and holding people for contempt until they produce records is done in the public eye. Thus, they Feds are limited to picking and choosing actual suspects rather than spying on everybody. Well, too bad -- that's what they're supposed to be doing anyway.

31 posted on 01/01/2016 10:06:17 AM PST by Gandalf the Mauve
[ Post Reply | Private Reply | To 7 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-31 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson