How to Send an Unbreakable Encrypted Secret Message.

preview_player
Показать описание
Subscribe to my alternate platforms:
Send Bitcoins to: bc1qc5jq4dxt7359sh80lkv9v8rlsgnh322hmn6xyc Send Ethereum : 0xe7cC2e415E0D2d1De91604B2b693f124dfBCf9B8
Send Litecoin : LYwDy55mZSeb1Czx6JUiTS5YkqjfmWKK5H
Рекомендации по теме
Комментарии
Автор

Welcome to the world epsionage and the facination of the number stations.:)

jumpit
Автор

Incredible video, thank you for showing the method

henderson
Автор

Cool. Very handy information. It seems like the hard (risky) part would be delivering / receiving the pad more so than creating the randomized pad. I don't have anything to say that would warrant the use of a one time pad but I can see the need in understanding how to use it :)

MichaelLloyd
Автор

It would be neat to do this with a computer so that at the end you have binary code which gives you a bitmap, or better yet you get a black 'n white video in just high enough quality for what it is needed for, and, if is even kind of compressed and with sound similar to mono.

wheelieblind
Автор

This could be in top 100 most useful videos list on my entire youtube life

rhamisdhai
Автор

Cool video. Thank you.
Would be funny to try to travel with a Paraset and a OTP booklet in the cabin suitcase. lol!

jesusreverte
Автор

A friend of mine and myself set up a system where we both had a book and we could create messages based on page number, line number, word number and letter number i.e page 3, line 4, word 5, letter 3. The message would be sent as '3453' and so on. We just did this via skype for a laugh.

vkop
Автор

4:08 yes yes 13-6 = 7 so message has H.
same thing as ceasar cipher with key "word" and it change every letter for new key in this you have keyword GEXOI. same thing as have A-Z on paper and when key is G you move that G under A. right away you see H and under N this works exactly same.

and when you encode your message encode it again with different key. that actually mean you encode it one key bcoz it just add keys together
meaning if you encode with code MOTHER and then encode again FATHER.
easy remember but its same as encode one time with ROWOII

JarppaGuru
Автор

Awesome one but need more details such as adding space symbols

vishnumr
Автор

dont even know why i'm watching this, but this was fun! love it

adeeliyanage
Автор

Thanks for this Gil. This is actually incredibly useful information.
73
Julian oh8stn

OHSTN
Автор

The numbers, Mason! What do they mean?!

eduardobarbosa
Автор

The Galaxy Cipher Machine: Calico encryption.

An unbreakable cipher machine for secure short communications, and for coding passwords to access larger data files. With each rotation of the discs, and replacing of the set discs, gives another password segment (and which segment it is in the order). Together they are safely used for the full password. A method called CALICO password. Or before each disc shift you are given a password and the number representing it. After the full decode you may have seven passwords, for seven password requests. You enter the first password that would usually give you the information, but instead it asks for another password, then another, until all seven are entered and you are given the information. Each password has at least 30 letters in it to further decrease the possibility of being decoded by a spying party.

Set up:

A disc cipher machine on a spindle, the discs are like checkers in that they have notches to fit into each other. 1st wheel is the set disc with the numbers 1-80 scrambled, etched around the side, and on the top edge are three alphabets, scrambled the same, with two empty spaces to make 80 digits around the top. Each letter on the top is over a number on the side. There are 26 body discs, each having two rows (top and bottom) of 1-80 on their sides.

The first message is a four number code: 1234. This is first a security check. The number 23 on the disc, 4 to the right, plus 1, gives you the security response.

For the set up: The number one represents which set disc is to be used. The 23 is the number on the set disc that is under the letter on the top "E". This letter is the first body disc to be put on the spindle under the set disc. Depending on what the users invented for themselves, an even number goes left, odd/right. So the order of the body discs is the E first, then of right for the rest of the letter order for the discs. The body discs are like checkers in that they have notches for them to fit into each other. There is a dot on the bottom of the set disc somewhere between two numbers, and a dot on each side of each body disc as well. The last number of the 1234, the 4, is how many (left or right) notches to shift the discs as they are being put on using the dots as beginning points. 4 was invented to mean right for the dots so each disc has their dots spaced 4 notches to the right of the one above it. It is also decided/invented which discs go on up-side down. Once all discs are in place a tightening bolt is screwed on the spindle to secure the discs.

Operation:

In the coded message sent, the first 30 numbers are still part of the set up. The message follows after them. In these 30 numbers you have invented the pattern that if there are two number 6s in the 5th, 13th, 18th, and 29th numbers, the message is authentic. If there are more or less than two number 6s the message is bogus and is disregarded. In the first 30 numbers, you take the 4th and 9th numbers to know which algorithms to use, in this case both numbers are 12, 34. You have invented at least 10 algorithms. The first message letter is O. Find an O on the top of the set disc in one of the alphabets (using another alphabet for the next O), and go down to the number below it on the edge, say 57. Now the first four algorithms are made up by the two users of the machines so they can be anything their imaginations can come up with. Like, from 57, down five discs to the top row of 1-80 where the number is 32, find 32 on the bottom row and go down 7 more discs and do the same, then go straight up to the set disc. 2nd algorithm is a diagonal angling down to the right 8 discs to the lower number on that disc-46, then finding the 46 on the top row, and straight up the to the top set disc. 3rd algorithm is another imaginative pattern ending at the top number 78 on the set disc. 4th algorithm now has a sleeve that fits over the machine with holes randomly drilled into its side lining up with each disc's number lines, 15 holes per line. Now look again to the first 30 numbers and see the 18th and the 62nd numbers are 36, and 84. So now the 78 is lined up with the 3rd disc's top number 6 hole, this shows the number 69 in the bottom number row hole 8. This continues for 4 discs to the last number 51 that is sent in to the other communicating person. (36, 84 is third disc, holes 6 and 8, for 4 discs)They run it all backwards to find the letter O.

Throughout the sent message there are many OOs. The pattern invented is that you go six numbers beyond the OO to see if there is a number 5 in that number (75). If there is, you know it is a body disc shift. The other number is how many notches to shift each dot.(Odd numbers one way, even the other). Do this at least once every message. If there is a 2 in that number (27) it means to replace the set disc with another one, in this case the number 7 set disc. You replace the old one and just line up the dots of the new set disc directly over the dot beneath it on the first body disc. Do this at least once every message for both set and body discs.

Another code invented tells you to change the entire order of the set up with a 4 digit set up number following it. Golden rules: 1) Never use the same set up code more than once. 2) Always send at least 15 phony messages for every one authentic message. 3) Always shift both the set disc and body discs at least once every message. This cipher machine has ever changing/shifting number patterns, an infinite number of invented algorithms that are used in different orders, a large number of 4th algorithm repeats, and every set of machines has a different operation. Each operating set of machines have virgin discs no other machines have.

This cipher machine cannot be broken, not even by the largest computers in the world if used correctly. The confirmation that a code has been broken is that the message appears. With a 500 letter message, if 500 GCMs are used where each machine only encrypts one letter, there is no confirmation the letter that comes up when trying to break it is the actual letter that is in the message. Every letter has a machine with different discs, different algorithms, and different operators encrypting it. So the most any attempt to break the code can do is acknowledge that each letter position could be any of the letters in the entire alphabet (A-Z). To write out the possibilities on paper would be to have an entire alphabet under letter position #1, then another one under #2, an so on. In the end there would be 500 alphabets in a row as the only clue to what the message says. Its like telling the hackers there are 500 letters in the message and the words are in the dictionary. With this small bit of information it is IMPOSSIBLE to even begin to try to find the message. Not even the biggest computer in the world, working on it for 10, 000 years could find the message.

This encryption form is called CALICO ENCRYPTION, it is unbreakable, and is perfectly suited for the Galaxy Cipher Machine.

harryrussell
Автор

I thought the point of sending an encrypted message is in hope it CAN be uncrypted on the other end, not being ‘unbreakable’.

nillsgills
Автор

Thanks Gil for the information and a bit of history lesson from the past =) YES .... a note to all "NEVER NEVER NEVER SEND ENCRYPTED MESSAGES ON THE RADIO ! ! ! ! !" Just do not do it ! ! ! ! ! Have fun playing with friends though =)

pathopkins
Автор

Or just use an enigma machine and another one so no computer can guess the right message

albinprivat
Автор

Your all videos are absolutely amazing. 73 de Darek SQ7HJE

Darek
Автор

Its a very nice video but i didnt understood how i would write sentences?

aa-lnvt
Автор

Ok. This method gets a little tedious with any message of length. If we are using pen and paper, setting up a Vigenere square would speed up the cipher/ deciphering process. Also, the complexity of managing one time pads over a cipher net (more than two people talking and listening) is a bit of a pain which, although the use of one time pads was well understood by the start of the 20th century, it was never put into large scale practice. Why do you think the Germans used an enigma machine and the allies used M-209 converters? Both those machines are, in theory, perfectly secure. In practice, sloppy technique and high volume of traffic led to the breaking of the system. What do you do if your one time pad is compromised by one member of the net? The cardinal sin of a one time pad is using is more than once. Two messages sent with the same one time pad are rather easy to break. The sending and receiving of ciphers is rather more complex than at first glance. Once you get into real world application, trouble starts, and although one time pads can work, they often don’t. The willingness and ability of the cryptanalyst is also important. Just as you pointed out, even morse code alone could be secure enough against unsophisticated foes.

If you really want to set up a cipher net to use in the event of a prepping situation, something a bit more sophisticated than one time pads would be required, and no cipher net is secure unless the participants practice strict cipher discipline - something probably beyond the ability of most groups of rag tag survivors.

charlieb.
Автор

I cont understand there "-15+26 " why 26 where it is come from ? Is it mean 26 alphabet ?

sigmamale