Secure Method of CommunicationWritten by Max Penn
Secure Method of Communication Introduction... In today's business world, your business competitorswill often try and get an edge over you by any means possible.This includes attempts at intercepting your sensitive business communications. This is why it is highly recommended all companies, including yours, buy secure communication equipment for sensitive business communications. The problem... But what happens when you're out of office, you don't have your secure equipment with you , and yet you still urgently need to communicate sensitive information with a colleague...? The solution... The solution is having an alternative method of communicatingsecurely by encoding your messages. This system is called one-time pad and is absolutely impossible to crack. Even biggest supercomputer of any one spy agency would not be able to accomplish this feat. The only things required are a pen and a paper. Once encoded, you may send your messages by mail, email, or even by phone. Let's get started. The one-time pad method Step 1: Create key... The critical component of this system is random key. A key is a series of numbers that is used to take your original message (the plaintext) and turn it into a coded message (the ciphertext). Before creating a random key, you need a way to convert alphabet characters into numbers. Make a conversion table by taking a sheet of paper and writing letters and numbers as follow: A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | You are now ready to create a key. First, write down a series of random alphabet characters, such as RTISEWVZQYHKOPBU. Break this long string of letters into blocks of two characters each, as follow: RT IS EW VZ QY HK OP BU Using conversion table we've created above, convert characters into numbers. For example R=18 and T=20, so first block HL becomes 1820. The result is 1820 0919 0523 2226 1725 0811 1516 0221 You have now created your first key. (Make sure to create a key much longer than this so that you can send several messages before key is used up.) As you will use block of numbers to encode your messages, you will cross out each block you have used as to not use it more than once. (To simulate crossing out of a block i will gray blocks as follow: 1820 0919 0523 2226 1725 0811 1516 0221 ) Create two copies of your key. One for you and other for recipient of your messages. Step 2: Format your message... Let's use an example. If message you want to encrypt is ACCEPT IT, you format this text message into blocks of two characters each, yielding AC CE PT IT. Next, convert letters into numbers by using conversion table above. In this example, A=01, C=03, so first block would be 0103. The entire string becomes 0103 0305 1620 0920. Rules... Rule 1- Numbers. Spell out numbers in full in your plaintext. For example, 123 becomes ONE TWO THREE Rule 2-The Period. Use an X for each period in your plaintext. For example, GOT YOUR MESSAGEX APPROVE TRANSACTIONX. Rule 3-End of message. Add XX at end of your plaintext message for termination. Spies would add several bogus characters after XX to make it even more difficult for code breakers(those who tries to decode secret messages) by making them try to decode those meaningless characters after XX. Step 3: Encode your message... We need a way to tell recipient where key begins, otherwise he won't be able to decode message. Remember in our earlier example, we created a key and stroked off (in gray) blocks we'd already used.Here's what our key looked like. 1820 0919 0523 2226 1725 0811 1516 0221 The starting position in key is at block 0919. So we will place string 0919 at beginning of our message so recipient will know how to decode. The plaintext message of 0103 0305 1620 0920 becomes 0919 0103 0305 1620 0920 because we place pointer 0919 at beginning of string. We are now ready to encode our message. First we write out plaintext. Directly below it we write out key. Then we add key to plaintext using Fibonicci addition. This means we do no carrying. For example, 9 + 2 would yield 1 not 11. And 7 plus 6 would yield 3 not 13. Here's how agent's working sheet would look. Plaintext | 0919 | 0103 | 0305 | 1620 | 0920 | | | Key | -- | 0523 | 2226 | 1725 | 0811 | | | Ciphertext | 0919 | 0626 | 2521 | 2345 | 0731 | | | The encoded message is ready to be sent to intended recipient. You now have a message that can absolutely not be cracked by anyone but intended recipient. Decoding message...
|