Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: BagCamAddict
Well then let's be sure to broadcast it on the internet. ;-)

Unless you know something I don't. I was just talking in generalities about the primary vulnerability of one time pads - I have no earthly idea if we've been that lucky. It's a rather obvious vulnerability too, so it's not even as if writing about it ought to surprise anyone.

But of course one of the fallibilities of human nature is the belief that one's own plans will always proceed as anticipated, so that (in this case) they might not have worried enough about their worst enemy getting hold of all their computer data.

Take care. :-)

124 posted on 08/02/2004 8:29:13 PM PDT by brucecw
[ Post Reply | Private Reply | To 115 | View Replies ]


To: All

Codes anyone? Here is another great find by Casey over at It's Happening (machine translated message on Arabic forum). Casey posted it yesterday. I will post the followup message she found next.

***

Re: Messages, Coding, Hiding

The coding at the Islamic groups - do he is really an useful ? ( a message of the sharp camp )

First I beg the supervisor the non deletion of the subject because I see it a political subject from the side of the work of the political groups

I love that I notify the brothers the supervisors on the sharp camp concerning the coding subject that mentioned in the number 15
- the mentioned ways are for the coding primitives and unsafe at all with all respect to the subject writer Saif Aladl

- is using more complicated ways from that by many in the First World War between the countries, and they have succeeded in breaking codes many of them,

- he can any university student in the specialization of the mathematics and has taken a subject into the coding science basics that he clarifies a code the mentioned Baltriqtan complied with the number by means of statistical information about the used language ( the used letters with abundance in any language )

- from the safe ways now for the coding the use of AES way - 128, and she is a complicated mathematical way, and the use of any program is possible for coding any file at you by that wording
There are many of the free programs that carry out this work like Axcrypt program

The butter : I do not advise at all on use the mentioned ways by the magazine, but it used any program that uses the mentioned way,

Also the mentioned way in another Islamic site ( I believe that it is the site of the army of the Sunna supporters ) or he is properly speaking a done program by one of the brothers it carries out the exchange of the letters for other letters
I say that that way is unsafe at all




Coding favoured that suited it he that it does not use the coding at all

And he used an allowance about it the camouflage and the blackout and the concealment



The dear sir is terrorist¡

Layta you clarify your viewpoint a more is !Why does she think that the coding is not useful ? even if it was with a power that exceeds 500 bits¿

And what means with the camouflage ? does she mean what knows Steganography mind ¿ any hiding the information inside a picture or the file of my sound¿

Allah guided you and benefitted in your knowledge ..




The coding many kinds, their simpler are the exchange of the message letters by other letters with the use of a specific key,
An example :
The message :
He met me in a specific place
The key : a change the ( Þ ) by a letter the ( í ), a governor ( Ç ) by an edge ( ä ) and so to all of the letters
She becomes the coded message :
Ynskhzkh Thkh Kgnz Kaoukhz
This way names or
Simple Substitution Cipher

And to she disconnects the thesis, should know the key ( each letter by what was replaced )
And this the simplest ways of the coding and their use has started since more than 150 years

And the way of dismantling the coded message very simple ( without that it has the key ) but it takes for some time ( from 6 - 7 hours )

The idea is that it in each language letter is found they are used with more than abundance the other letters, for example, in the English the e letter on what mention I am the most using letters ( more than recurs all other letters ) then comes after it in the repetition other letters,
With the use of these statistical information, the clarification of the code is possible very simple about noticeable way with more letters a repetition, ( all the blade not was longer all their dismantling not was below, this for the mentioned way at the beginning of my subject )

Why he became possible breaking the blade ¿ ¿ simply because the coded message herself carries many of the information ( the repetition of the letters )

A return to the main subject : the mentioned ways in the sharp camp do not differ many about this way, where that each letter takes place its exchange for another letter, then the change of the letters places takes place ( this is the additional thing )
She way similar to this is used in the international war by the century beginning, and the clarification of all its codes have taken place

To the brother Vailed Knight
I did not mean at all what mentioned from that the coding not Majdi, all I not was meaning that I clarify it he is that the coding ways are very many, from them the simple, and from them the object and from them what is he the easy of the breaking and from them what is he the difficult of the breaking ( reaching a way did not take place for his breaking as he is the state with AES way )
And my subject was an expression about a warning that the mentioned coding way in the last issue from the sharp is not strong at all, and very a possible broke it ( as in the way Allti in the first example )

The study of the Internet is possible about the AES way working way and its basics
And the brotherhood in the sharp they do not need the knowledge of its technical details, but that enables them if they wanted
She is found many of the programs that uses the AES way for coding the files, and the use of these programs is possible with safety

And he grieved if my explanation was not understood
To more of the information study the Internet about
Cryptography
simple substitution cipher
polyalphabatic cipher
AES

To the brother a terrorist :
The camouflage is good, but there is the AES way as mentioned then she is safe

And I suggest that she writes the thesis in a file and a prayer for example or any other wording, then it codes the file by any program with the use of that wording

Then the sole way becomes for the return of the file to its original wording before the coding by means of the password, if it was lost, with it the message was lost

As finds programs enable you making the key ( or the password ) more than part

In other words, if there is a message, and no the divine decree the enemy could that the message holder at it that does not can dismantling the thesis and its reading except at the knowledge of the password afflicts you
And if she was more than part, then sends the leader two messengers, one of them he carries the thesis with part of the password, and the other carries the other part from the password, then no enables to the enemy the reading of the message except after the arrest of the two persons that know both of the parts from the password, the leader Al-Zarqawi if he used this way, what the Americans managed the reading of his message directed to the sheikh Ben Laden




To who did not understand the first example, this a clarification of the simplest ways of the coding and the blade breaking way
http://www.trincoll.edu/depts/cpsc/...ubstitution.htm

I love that I hint that there are free programs by the Internet that carries out breaking the mentioned way of the coding, and I have passed on some of them sometime ago



The In the Name of Allah Most Gracious Most Merciful
I praise him and invoke peace upon its noble messenger and after :


The generous brother is Mofateh :

There is more than from a famous Khwarizmi for the coding from it for example :




DES

triple DES

RC4

RC5

AES



And other many, this is in the coding, as for sending the messages then there many ways from their more important are the way of the general and special keys

And its idea is that the sheikh Osama possesses two keys one of them are special he does not know of him one of and the others are a year that all of the peoples possesses

, if he wants that he spreads a message of the Muslims, he codes it ( or drops it electronically ) by its special key, if it opened the message it is not opened except by Moftah the general sheikh

Then when since the future makes sure that it is from the sheikh ( because the secret key that only the sheikh knows alone )

And if the future wants that it answers the sheikh, it codes the response by the key general to the sheikh and who clarifies its coding of only the key related to Abu Abd Allah

That is Ok I the time urgent Wmrtbsh takes this connection and two dimensions we agree

http://www.pgp.com/products/freeware.html

Goodbye


129 posted on 08/02/2004 8:38:30 PM PDT by Donna Lee Nardo
[ Post Reply | Private Reply | To 124 | View Replies ]

To: brucecw
"But of course one of the fallibilities of human nature is the belief that one's own plans will always proceed as anticipated, so that (in this case) they might not have worried enough about their worst enemy getting hold of all their computer data."

Yes, and their religion is the fuel here since they put complete faith in allah. They believe allah wants them to attack. They are always praying to allah and asking allah to blind us from their jihadi work. It appears in messages again and again. They figure that -- if allah wills it -- their attack plans will not be disclosed until the hits have occurred.

287 posted on 08/03/2004 8:20:45 AM PDT by Donna Lee Nardo
[ Post Reply | Private Reply | To 124 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson