[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/wrol/ - Without rule of law, or shtf.

This is for the discussion and preparation for the possibility of the happening!

Catalog

See 8chan's new software in development (discuss) (help out)
Infinity Next Beta period has started, click here for info or go directly to beta.8ch.net
Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Embed
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, swf, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 5 per post.


Now with more Bugging In!

File: 1447771223076.png (688.85 KB, 2000x2000, 1:1, ohshit.png)

058521 No.906

Cryptography thread?

Cryptography thread.

Alright faggots, y'all need to learn about making codes and ciphers.

Lets start off firstly what are codes and what are ciphers.

A code, 1 input 1 output. Much like a word in a dictionary. Generally for words or for phonetic sounds.

British = Dong

Coming = Expanding

THE DONG ARE EXPANDING!

The shortfall to codes are that they are generally a 1 to 1 conversion. Repeat one thing enough, it sticks out to the cryptanalyst. They're bulky as well.

Code books are large, easy to steal, and generally inconvenient. Bible code = shit guys, everyone knows it. Even my Grandpa. Also, codes are used incorrectly many times.

Use the code for a name, not for an action. Lets say its back during chanology,

Hack = snorkle

DOS = pancake

Lets Pancake paypal.com

The target is known to those listening, so they know something will happen to paypal.com but what is the question.

Shekel lords = Visa

Lets DOS Shekel Lords

There are more whos, than whats in the world.

A cipher… its math pretty much.

K = Key

O = Operation

M = Message

C = Ciphertext

(C) = ((K+O)M)

If I can math correctly, this means Ciphertext is Key and Operation plus one message.

Change the key, different output, change the message, different output, change the operation….. obviously different output.

The shortfall of the cipher is that there are unintended shortcuts (breaks) to the plain text.

For the best security, you're going to want a cipher. You can encrypt a code with a cipher but if you're going to do that, just go with a cipher.

058521 No.907

Before we start talking about ciphers, we need to talk about how SECURE ciphers work. We also need to know what an operator can do to make it better.

~Confussion~

How do we change what the message looks like?

Converting plain text to another medium

>91945 82193

>If this were a straddling checkerboard, is 9 just one of the common letters or is it one of the binomes starting with a 9?

>Ein zwo drei vier funf sechs sieben acht neuen null, most Americans don't speak German, using a language like, Croatian could be useful, but it only works as a verbal caesar cipher.

Increased keyspace

The more possible letters to use in a system the more possible outputs right?

>What is the correlation between A and the rest of the alphabet, what are nulls characters, of the 40 different characters (in a theoretical cryptogram) showing up, what is the possibility that E is either X, J, or 5?

>If E has multiple outputs then it lesses the frequency of the letters.

~Diffussion~

How do we change the fingerprint of the language?

THE, the 3 most common letters in English, in a 10 letter message, how do we diffuse the letters into the cryptogram to hide the letters?

Transposition

Change the position of the letters in the message, essentially scramble in a way that only you and your intended recipient know about.

>HELLOWORLD

>WOLEDRLHOL

Removal of structures/spaces

There are few words in the English language that are 3 letters long and used constantly. I just used 3 of them. 1 was repeated twice. If I can find those letters I can start to look for shortcuts or breaks in the system. This gives me limited characters and I can start to determine how the cipher works.

>Smoke Meth Beat Whores Hail Satan

>SMOKEMETHBEATWHORESHAILSATAN

>SMOK EMET HBEA TWHO RESH AILS ATAN

Brevity

Shorter messages means you're less likely to be DX'd. It also gets you off the radio faster. Less talky, less battery useage, more time to situational awareness.

>Two enemies killed, no casualties, four magazines full, two liters of water left, battery 75 percent. Where are you?

>2 NME KIA 4 Mags 2 L Bat 75 P XX Your pos QQ

The only issue with brevity, is that people must also know what the fuck you're talking about with that short hand mess you just typed.


058521 No.908

File: 1447773219015.jpg (1.51 MB, 2560x1920, 4:3, 20151117_095414.jpg)

Firstly, lets start with an easy to do cipher.

We all know the Polybius square right? If not, Polybius was this chillaxin and decided that he needed a new way to change letters to numbers. So why not just do the XY coordinates of letters? This is similar to the shit you learned in school, X coordinate = going horizontal Y coordinate is going down though. With an expansion of the square from 5x5 to 6x6 we now have 36 spaces, the whole Latin alphabet and numbers too. If we used the numbers only, it would still be the equivalent of a Caesar Cipher. So now we add the randomness of dice to the equation. In this example I assume you had written out a pad of dice rolls.

This is modular math though. Think of it like a clock. We generally don't say 13 o'clock. We say 1 o'clock. The clock is modular 12. So lets do this with 6. 5 + 3 is 2 not 8. If it helps, just subtract 6 until it becomes second nature.


058521 No.909

>>908

It also helps to have the dice rolls written down before hand. They can be rolled in real time and then the key can be transmitted at a later time with a severe compromise to security. Also the reuse of a key is bad news. I can compare messages and determine the difference and extract the plaintext from both messages.

The generation of random numbers could be used to pass time for survivors in your group. For one or two hours, just roll dice, write them down in groups of 200 or something. Thats 10 lines of 20 dice rolls. 5 groups of 4. This makes a total of 100 digits that you can encrypt per pad.

All in all I rate this to be a high security cipher provided you write the pads before hand.


058521 No.910

File: 1447782324522.png (5.94 MB, 1920x2560, 3:4, edit.png)

>>909

This is an example of how you don't always need a random key, it just need to be random enough.

The CIA needed a way to get communications material to agents in the field. Using a One Way Voice Link (Numbers station). E05 Known as Cynthia transmitted groups in a 4 number format just like this. I also have confirmation from reading that this is the exact same system used. Anyways, a one time pad is pretty much a smoking gun for espionage, so CIA got the idea to give people books and use a system just like this. While the header is different, this works for us.

Firstly, both sides of the conversation need the same book. The page 67 for example is now said and written as 067. Secondly the amount of key text used is also transmitted, no less than 100 no more than what is on the page. I used 150 characters so the header will be 067/150

Step two write out the key and plain text. Notice at the top of the text I have written out 1,2,3 etc on top of each column. Those will transpose the book text to make a random looking text. This will now be used as the key for this message.

Step 3 write message on top and use math.

step 4 transmit the groups.

The to decrypt, subtract the key from the message and profit.


058521 No.914

File: 1447788577719.png (5.76 MB, 1920x2560, 3:4, strayapostin.png)

>>910

So far we've learned about one time pads and pseudo random sources of entropy as "additives", something you add to the plain text. But lets take this a step further. Now, we're going to go over something called serration. I don't know who the jack ass was who coined the term but its even used in the DoppelKastenSchlussel paper on the NSA website. So the term's been a round for a while.

This is a basic transposition… kinda. It breaks up the ciphertext, so when the analyst goes to analyze it, he finds the a frequency distribution for ciphertext binomes if they were scrambled.

So lets apply this to the playfair cipher. In this example we will use a serration of 20 digits to keep it simple, but cryptanalysts like me will check for multiples of 4 and 5 in serration if we believe it is being used. 21, is semi prime of 3 and 7 is long enough and obtuse enough to provide a lot of security. Mixing the serration of the DoppelKastenSchlussel with the keying of a book like the Australians did for coast watching and we get this hot mess of a medium grade cipher.

On top of this, we will key the square. This means we will use a shared secret with our intended target. This may be a word, phrase, or something else used to further secure the cipher.

Firstly we will draw are polybius square. But instead of the normal alphabet lets use the key "8chan". Remember to not write any of the key letters twice, otherwise you have to do a lot of erasing.

Like the CIA book cipher we will choose a page, a set amount of keying material and then write it in the key box. I chose 100 characters from page 157.

Now, write your message out, in the serration length you have chosen, In this example we will use 20 because its square and I can tell if I fuck up. Next we will write the keying material above or below it, I prefer to write the key first then the message.

Next we begin cryptographic operations. For the playfair which you might remember from school if not here is the run down.

If the letters are in the same row, such as 8 and c, shift one letter to the right. Since 8 is the first letter it is C, the letter the right of C is H. So X and 2 are Y and 3. 2 and 3 is 3 and X. If it goes off the edge of the square, just wrap around.

Cipher text digits on the same column? Just go down one spot. 8D is DK, C5 is EC, I2 is P9… get it?

Plain text and Key letter are the same? Just ignore it. Sometimes a cipher digit needs to encrypt to itself. If it doesn't I can slide a word over the cipher text and compare looking for collisions on letters. This was part of the downfall to the Enigma. This is also a problem with original playfair.

Not only do we have a key space for the polybius square but we also have the key material from the book and the crypto operation. This is much stronger than the CIA book cipher but still not as strong as the Dice and Polybius square. True random trumps pseudorandom any day.

Ciphertext fit neither situation? Cool. It forms a rectangle if you think about it. IS makes a rectangle with E and V as the other corner markers. Not making sense? Say that you have 8 and 0 as the digits needing to be encrypted, on the other corners it will be B and 4. It should make sense now.

Against normal people, this is high grade, against an adversary such as a dedicated sigint group, this will provide some buffer space until they try a the correct serration distance and a hill climb attack with computers.


574563 No.915

>>906

I love Cryptography. It's what got me into math after I dropped out of high school, and goes hand in hand with my ham radio obsession.


058521 No.916

>>915

Nice to hear. I mostly like PnP ciphers. They're graspable for me, most of the computer crap sucks. Anyways, I can't sleep and I'm working on a few more sheets. Gunna go over PRNG and some other ciphers and work to more lower grade and tactical ciphers over the next few days.

Things to expect

Multiple forms of PRNG and other ways to change key boxes

Double transposition disrupted

ADFGVX

Dryad

10x10 "brevmat"

Amsco from ACA

Two of my home brews


058521 No.917

File: 1448072834602.jpg (1.45 MB, 1920x2560, 3:4, Random By Hand.jpg)

lazy asshat is back with the maths

Firstly lets start with Decimal Fibinocci

54608 ← my seed

Now, look at the numbers under it, see where it says 9 and 0?

5+4=9

6+4=0

54608

9068

Now to add the next last digit and the first one on the second row, 8 and 9.

8+9=7 (mod10)

54608←seed

90687←generated bits

96456

Division

3/59 = 0.0508 47458

You can mix, this with the original decimal fib, you can also expand upon the 5 digit version to this and then double your key material generated for just some addition and calculator button presses with no deterministic source.

Middle halves

The only thing you have to do with this one is multiply the center and left side.

On the bottom of the image, we can see where we can use different patterns for keying substitution boxes. Some can be written diagonally. Some are circular, some are written top to down, etc.

Keyword keying

You've seen my original one where we take the keyword and type in the rest in the substitution box. But now, we can use the keyword as a transposition key based on the alphabet value. Otherwise, just go from left to right order.


058521 No.920

File: 1448084405419.jpg (1.54 MB, 2560x1920, 4:3, ADFGVX.jpg)

So lets start with something basic, ADFGVX. This cipher works great because the letters are very distinct in morse code, not to mention the limited letters makes it harder to cryptanalyze. 6 letters, transposed over an odd transposition makes it much harder to crypt analyze.

Firstly, you will require a minimum of 10 letters for a password/phrase and a date/5 digit number.

My password is Roughnecks and my date is 7/4/1776

We will serialize the letters in the password. The letter that comes first in the alphabet is going to be number 1, the next is 2 and so on. So C is one, there is no D, but there is an E so E is 2, G is 3 and so on, 0 is the final letter.

Once you have serialized the key, underneath, go to the date you've written down, make sure you have 5 numbers out of it. Make up 5 random numbers in your head and proceed to write out the the numbers under he date at the top. Add the two numbers together using mod10 addition.

Now, chain add the seed you just made with the date and your 5 random numbers. This should make 10 digits in a small box next to your serialized password. You will take this number and add it to the serialized number. Use mod10 arithmetic again. You should now have a seemingly random number. You will chain add 30 digits under it.

The original 10 will be the transposition key. Transpose from lowest to highest order 7 rows or 21 digits.

Use this as a key for transposition, I recommend 3 groups of 7 to ensure you write all of the numbers.

Using the Polybius square, write your letters underneath. Once you've finished your message transpose it.

You will notice with the cipher it is easy to make the mistake of forgetting one of the transposition columns, you will also note that with the chain addition, one small error can propagate through the whole stream corrupting more than just one digit.

History

It is recommended that you don't use the same key twice or send the same message using a different key. This is very similar to what the Germans used in ww1, it is a well known cipher in the encryption community. This will be a medium grade cipher if you send a lot of traffic with the same polybius key and the same transposition key, as was the error the Germans made. But they changed their transposition and polybius daily. We can change the transposition key with every message.


058521 No.921

File: 1448085380730.jpg (1.47 MB, 1920x2560, 3:4, Double Transposition.jpg)

>>920

So, now that we can do a single columnar transposition, why not do two? That's what everyone has thought of in every military out there. It's simple, it works. Still has the same drawbacks as a single transposition.

This time we're going to need to make 50 digits of PRNG instead of 30.

We're going to use English here instead of using substituted text. This makes it easier on the operator to tell if the message came through.

Now, we're going to take 20 digits, or 4 columns in lowest to highest order again and write that out.

This will be your first transposition key, then we will write out our message under this. We will then go a few rows down and write out a second transposition key using the unused columns, from what is left from the lowest to highest order select for more columns.

See on the second transposition where I have that little pyramid under the 1? I am going to find the lowest number furthest to the left and make a no-go zone for my text. Make sure to compensate for any line breaks, like I have with mine. Begin to transpose from the first key into the first spot on the left. Fill up the go zone on the left first before filling up the nogo zone on the right. Also, this has to be in complete accordance to your cipher text size.

Once everything is filled in under the second key, just transpose again. You should finally have some real garbally ass gook down in the bottom.

Now instead of using a polybius square we're going to use straight English text just because its easier on the cipher operators. I recommend that you have at least 100 digits of text, this is because you can anagram English looking for letters like THE or something in the jumbled text and try to work out the key. More text enciphered more possibiliteies to start from. When using quatsch make sure you use reversed anagrams or something to throw off the lead of the cryptanalyst. The letter Q is only followed by U in English, writing Q on one side and putting u on the other side will help confuse the cryptanalyst.


058521 No.923

File: 1448086236094-0.jpg (1.56 MB, 1920x2560, 3:4, Home Brew Tactical.jpg)

File: 1448086236094-1.jpg (1.48 MB, 2560x1920, 4:3, Helpful aide.jpg)

>>921

This is one of my home brews, what if you were to encorporate a geographical position with a random key? For example if you have

ABCD

If you chose A with an even key number it made you select the letter to the right, which is B, odd, to the left, D.

What if you were to expand that into all directions, up down left right and diagonal in every direction? This is what you would get.

PRNG

We use a 20 letter key instead of 10, this gives us more randomness and the ability to change up the key gen so its less apparent. 0's are ignored. We ill take the key, and use that to find the position of the ciphertext digit based on the position of the plaintext digit. To the top left we can see where each number corresponds. 1 to the top left, 9 to the bottom right, 5 keeps the ciphertext digit the same to prevent against attacks like enigma. 1/9th possibilty for everything seeing as 0 is removed from the equation.

When transmitting this message by voice

. = dot

? = querry

- = hyphen

/ = oblique

Once you've finished writing everything down, it helps to have a second sheet of paper so you can solve by row and then write it out in 5 figure groups after solving the cipher text.


09b4c3 No.924

>>917

Hey, you said you were going to upload your files to mega in the other thread, can I get a link?


058521 No.925

>>924

When I get unlazy enough.




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]