Cryptanalysis remains useless.

Now encrypt your message with the OTP. April 29, 2014 1:17 PM. @Clive Robinson The nearest perfect square is 36. so to approximate the square root of 38, you want to take the square root of 36 and then add 2 .5 x .5.

One was smaller than the other so that when placed one over the other, you could align letters in the outer disk with letters on the inner disk.*. Unless you design a public asymmetric algorithm, there is no reason not to make a good one. No need to explain the math, just use this algorithm whenever you need to combine two characters. The algorithm should only use simple primitives. I have wondered whether the numbers stations on HF radio are stream cyphers like this, meant for decoding with pencil and paper rather than with a one-time pad, since distributing one-time pads would be a pain. c. finding the largest element in a list of n number d. Euclid's algorithm e. sieve of Eratosthenes f. pen-and-pencil algorithm for multiplying two n-digit decimal integers a. Glove selection There are 22 gloves in a drawer: 5 pairs of red gloves, 4 pairs of yellow, and 2 pairs of green. Clive Robinson April 30, 2014 1:29 PM.

Try to find a implementation on Google, most of the old pages have been deleted or are on untrustable sources. Lilith may have had the CCTV in recording mode and access to computers and programmers inputting the algorithm observed during the authenticated key exchange or some pencil and paper communications.

You can then use random frequency variation within individual messages to statistically sort the column and row intersections with the diagonals, and then from there you can use proximity analysis to extend and sort rows and columns. This has minimal secrecy requirments for three reasons, firstly it has to be quick to use, because secondly the information has a very short effective life time and thirdly the code is ment more to compress data than to keep it secret. My idea in this area is to use the reverse of Blades sword (the vampire).

David in Toronto https://www.schneier.com/blackhat2.pdf (A Hacker Looks at Cryptography 1999).

We must not transfer the message (the content) in one piece, as it was in the good old days. So the time complexity is O (n^2).

The algorithm applies all rules in Sudoku and uses a more mathematical method to solve . @TIM

A random choice is made between: [1] Early pens such as reed pens, quill pens, dip pens and ruling pens held a small amount of ink on a nib or in a small void or cavity which had to be periodically recharged by dipping the tip of the pen into an inkwell. We now understand how the NSA got to firewalls, and solutions I might buy. So the resources involved, all CPUs should be forced to maximum so a brute force attack will require even more resources.

The only disadvantage is that they are more incriminating if found on you, but that could be countered by using steganography (like encoding the OTPs in books, letters or newspaper snippets crafted for this purpose). Not, mind you, that you should trust the hardware! The memory is cheap today, most people have machines with 16 gigabytes, the encryption should abuse all of it, making any attack a nightmare for the attacker.

1.

Not trusted is an opinion, but unless its obvious, some people may disagree. Hey Bruce, did the NSA have anything to do with Solitare? Personally I believe that xoring with 666 its safer than that, and probably the vulnerability (if any) is in public libraries or in the random number generator. This advice is all over the Schneier-advice link posted by Someone above. @Memo: Who uses a secret proprietary algorithm designed by the NSA? Whats often called metadata is the valuable information, sadly taken as fact [1]. these information squares are gotten apriori algorithm is divided in two major steps: join and to for producing the i-incessant itemsets then the hopeful prune. (see: https://www.schneier.com/blog/archives/2014/03/the_continuing_.html#c5351142). April 30, 2014 10:11 PM. The robot's ability to differentiate between a pen, a pencil and a stylus depends on its programming and the sensors it has been equipped with. Who do I trust to write one for me? dont forget to check your pencils for backdoors too. We need the law to take into account that there is no evidence, unless there is a warranty that all involved software, systems and procedures are free of error and could not be tampered with. Secondly, simply by scanning rows and columns, it is easy to enter the "missing colors", Autolykos Thank you very much Someone, unfortunately my algo is a simple symmetric algorithm, I will generate a 4 gigabytes long key made of good random numbers which I will put on a DVD, I will encrypt small messages for personal use and Im sure that the mother of the NSA cant break it with brute force or cryptanalysis. Memo With all due respect, Handycipher is not simple and the longer the message, the less simple it becomes to decrypt. http://www.nws.noaa.gov/om/marine/hfvoice.mp3, and here is a SITOR transmission:

Almost everyone knows how to do basic additions, subtractions, divisions and multiplications. So, paper and pencil encryption algorithm. It strikes me that the people making up these pencil and paper methods dont generally know what they are doing so it isnt necessary. The library? My recommendation: play with hash function design and psuedorandom number generators. I like the idea of a pen-and-paper cipher you can utilize w/out a puter, but this cipher requires both parties exchanging messages to be experts in how Hanycipher works. There exist several papers dealing with algorithms for solving Sudoku.

A completely made up example of a code book and super-encipherment: Text: The ship has the guns https://www.schneier.com/crypto-gram-9810.html#cipherdesign, Sancho_P a completely public algorithm developed by Belgian cryptographers. For instance you can make an analog for the German Enigma using three strips of paper for the rotors and a table for the plugboard swap pairs.

You can also do 10 + 3 = 13. Maybe this is a psychology issue; most people are more naturally optimistic than I and can see the thing as not broken because they dont see all the way through the problem to the break, but because Im (mildly) depressive I see the problems (dimly) and assume the breaks must exist. April 28, 2014 9:20 PM. Also, getting a backdoored pencil and paper system out there for illegal use isnt something Im aware the NSA is in a position to do. b)

Ive seen it in the news a couple of times, fairly recently; in fact, see this March story right here in this blog: Chilean Drug Trafficker Pencil-and-Paper Code. Alice and Bob have to appear natural and into a random puzzle rather than trying to scratch their heads over some cipher while knowing they are being watched by Lilith.

Normal maths (not bitwise) is more effective as anyone can do multiplications whereas bitwise method makes it more true to the sense of bitwise ciphers. As someone who is concerned about security, I regularly use various chemicals to erase unused memory; this is an imprecise operation and sometimes erases used memory as well. Nobody knows what the truth is, the common sense is saying that putting all the eggs in a single basket is not safe. with respect to Solitaire, its known that the core CPRNG is biased (see Crowleys work) which makes it suspect. https://www.grc.com/latinsquares.htm, uh, Mike So now it is possible to approximate roots. The fourteen page document seems like dramatic overkill. Combine by finding the first character (c0) you are combinging on the inner disk and lining it up with base point on the outer disk, then find the other character (c1) on the inner disk and the output is the matching character on the outer disk. I never fail to be amazed by all the wisdom hidden in Discordianism!

Anura

It is also possible to use branch-and . April 28, 2014 4:07 PM, And befor you ask yes I have done this with a group of scouts as part of one of their badges, and if all the boys in a scout group mastered it in a very short time Im sure a group of adults should be able to do it. Just do things in the manner that are actually well understood, and you will get yourself security without sacrificing performance for a perceived benefit. Subtractor: 9528 5193 8176 2839 1795

Anyway, as regards the cipher at hand, youre going to get different frequencies in the ciphertext depending on whether a particular letter is or is not on a diagonal, so I think you can figure out whats in the diagonals of the table. [1] We denote it briefly with the notation . On the inner disk, have the characters 0-9, A-Z written clockwise, in-order. Add/subtract without carry is the general form and is easier for people to use.

If you like what you see, the robot will then begin to draw your portrait . April 28, 2014 1:14 PM, What would you say to someone who developed an encryption algorithm, then challenged everyone with Ill give you a gazillion dollars if you can break it?, This post has nothing whatsoever to do with encryption. April 28, 2014 9:31 AM, Why not just use the Super Secret Cypher if youll be doing it by hand? How about making it so complex that it requires thousands of gates in custom ASIC circuits, thus increasing the cost of brute-forcing it with hardware?