Posted on 05/29/2002 7:57:29 AM PDT by John Jorsett
You need some technical sophistication to use these things succesfully.
There is a very low-tech yet unbreakable method. You and someone agree on a book in both of your homes. You send a series of numbers that reference a page, paragraph, sentence, and letter or punctuation position. To break the code you must know the book title, which number is the page, which is the paragraph (if you use it), which number is the sentence, and which number is the actual character etc.. In using this method, repeating the same letter will generate a completely different sequence of numbers each time.
Unless you or the other person tells the government what book you are using they cannot break the code.
For example if I sent you 2,1,34,6,10,7,1,26,4,22,4,20,3,9,1,37,1,1 I doubt if any of our alphabet government agencies could tell you what I sent.
Sending a unique value say 78 would tell the person to change the order of page,paragraph,sentence,character. If you want to protect it further you could apply some encryption to it but that usually means you have to have a copy of the code somewhere and the whole purpose of this method is to prevent anyone from finding the encryption key.
The only caveat with this method is to choose a book or books that would be common to many homes not something unique like the collected wisdom of Hillary Clinton, which only has 1 blank page.
You may be right Redcloak but to my knowledge, the method I described has not been broken without one of the parties giving up the book.
Strongly disagree! If used as described it has not been broken. Only if letters in the same sentence are reused (if your lazy) or you limit yourself to a single page (lazy again). The permutations are huge.
2,7,16,73,45,67,11,42,5,3,51,48,2,6,35,88 is "AAAA" encrypted. All you have to know is the book I used, which number is the page, which number is the sentence, and which is the character. (I didn't use paragraph I'm lazy it also is usually a smaller number and could be spotted.)I also changed the sequence somewhere in the string.
There are several pitfalls. A part of the book cannot be reused in other messages else the overlap allows unfolding of the code. It's not easy to select a book for two people to share and that is not obvious to the adversary; Bible, Quotations of Mao, Shakespeare, Book of Common Prayer, Gone With the Wind, Dictionary, etc., are all rather obvious. It's easy to check the code against many known books. Some books just do not have enough words (even The Dictionary) and using the book to select letters rather than words leaks even more information. The adversaries may also be suspicious that a suspected spy has a copy of a particular book.
One-time pads are uncrackable, given two conditions. One, they must be random. Two, they must be uncompromised. The Venona stuff failed the first test - the Soviets got lazy and started re-using pads when they should have tossed them. John Walker was possibly the most dangerous spy in the history of the United States. Why? He was was giving the Soviets the pads and the "word of the day" to tell them what pad to use - there was a ten-year period during which the Soviet Union read every single piece of flash traffic that the US Navy generated.
You say yes, I say no so we will have to disagree! Noodle this around. If raghead #1 wants to tell raghead #2 that tomorrow is the day he does not send out a 100 page document. He encrypts "tomorrow" using the selected book. Using only the bare minimum of code, out of a book with 200 pages, 40 lines per page, 80 characters per line. Any of the 5 characters can come from any page, any line with a source of 640,000 possible characters. To decrypt you need some pattern or some type of mathmatical repetition. Raghead 1 can use any "t", any "o", any "m", any R, and any "w" in an entire book.
Calling all number crunching type people what are the odds of finding the sequence of just 5 characters in 640,000 in the correct order?
The page,line,character sequence must be know. P,L,C or C,L,P or C,P,L etc then the book title must be known. You have to also know that this is the type of code being used.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.