Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Abu Dhabi: An Emirati and former banker has created a secret code language he says is unbreakable
GulfNews ^ | June 12, 2010 | Samar Salama

Posted on 06/12/2010 7:35:59 PM PDT by nickcarraway

Abu Dhabi: An Emirati and former banker has created a secret code language he says is unbreakable.

Mohammad Gaith Bin Mahah Al Mazroui is challenging skilled coders, hackers and cryptographers to break the encryption of his cipher.

Al Mazroui said there might be only one known cipher to date that had proven to be unbreakable,.

This was called the one-time pad, where every letter was transposed to another letter located a random distance away. But Al Mazroui said his cipher, which he called Abu Dhabi Code, was based on a group of symbols he said he designed himself.

"Encryption takes a written document and scrambles it, making it an unreadable document," he said.

"This is called ciphertext and requires a ciphertext decoder to uncode it and return it back to a readable format." Encrypting, he said, might replace, for example, every letter (a) with (z) and replace the letter (e) with (x) every time it saw it. So if you were to look at the document it would be difficult to read but a reader could quickly recognise the pattern and replace the letters correctly.

In his cipher, Al Mazroui said every letter was replaced by a symbol that he designed, which he said did not belong to any language in the world. "I worked for a year-and-a-half till I could reach this international code serving English, Arabic and any other language," Al Mazroui said. "I made the symbols up, designed them myself making sure they don't belong to any language in the world. It's a totally a new secret language," he said. Al Mazroui said anyone could create their own cipher, and the key length determined the strength of a cipher. Al Mazroui said many ciphers were a "64 bit" which was considered somewhat strong, but not excessively. The cipher which the internet used was a 128 bit, which was deemed very strong by industry standards, he said. Although it seemed even the strongest encryption could be broken by hackers using coder skills and software, Al Mazroui vowed his Abu Dhabi Code was unbreakable and could be the safest on offer for a host of different applications. "Experienced coders can use cryptanalysis known as brute force. This is a technique that attempts to decrypt a document by running through all the possible keys. But it would be almost impossible to decrypt any document encrypted using the Abu Dhabi cipher," Al Mazroui said.

Mysteries: Some famous unsolved codes

Kryptos: A sculpture at the CIA Headquarters in Langley, Virginia has baffled some for two decades. The sculpture contains four encrypted messages, of which only three have been solved. Kryptos was created and encoded by Washington DC sculptor Jim Sanborn with a system designed by the Chairman of the CIA's Cryptographic Centre.

The Zodiac Killer: This serial killer terrorised the bay area of San Francisco in the mid 1960s. He killed seven people (although he claimed to have killed 37), and taunted police by sending a series of coded letters to newspapers. Most of the codes were broken but one remains a mystery. The killer has never been caught.

Shugborough: An art history mystery in the form of a sequence of random letters at the bottom of a monument at Shugborough Hall in England. The inscription (O U O S V A V V) is underneath a reversed replica of a painting called the Shepherds of Arcadia by Nicholas Poussin.

The Beale ciphers: The Beale ciphers date back to an 1885 pamphlet which contained the location of buried treasure in the US state of Virginia. The story goes that a Thomas Jefferson Beale gave a box with three encrypted messages in it to an innkeeper in 1820. Attempts have been made to decode the ciphers over the years and it is now believed that the pamphlet may have been a hoax.


TOPICS: Conspiracy; Hobbies; Weird Stuff
KEYWORDS: abudhabi; codes; cryptography; jpb
Navigation: use the links below to view more comments.
first 1-2021-26 next last

1 posted on 06/12/2010 7:36:00 PM PDT by nickcarraway
[ Post Reply | Private Reply | View Replies]

To: nickcarraway
NSA has his originals. He's got copies and doesn't know it.

Amateurs shouldn't try encryption.

/johnny

2 posted on 06/12/2010 7:39:48 PM PDT by JRandomFreeper (Gone Galt)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

But is it as good and successful as the code talkers? Never broken.


3 posted on 06/12/2010 7:42:24 PM PDT by ThomasThomas (I wonder therefore I wander.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
"I made the symbols up, designed them myself making sure they don't belong to any language in the world. It's a totally a new secret language," he said.

Yeah, but it still stands for known languages.

But it would be almost impossible to decrypt any document encrypted using the Abu Dhabi cipher," Al Mazroui said.

"Almost" is not a real good word to use around cryptography.

4 posted on 06/12/2010 7:42:39 PM PDT by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
"I made the symbols up, designed them myself making sure they don't belong to any language in the world. It's a totally a new secret language," he said.

An alphabet, no matter how weird looking, does not a language make.
5 posted on 06/12/2010 7:44:24 PM PDT by aruanan
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
This sounds like a relatively simple substitution cypher. They are pretty easy to break. Of course, the person who claims to have a cypher must show that it really is a code, and not just random noise. They have to show that a message can be sent and decoded from their code.

Anyone can send a set of garbage, demand that someone “break the code”, and claim that it is unbreakable when there is no message.

6 posted on 06/12/2010 7:44:27 PM PDT by marktwain
[ Post Reply | Private Reply | To 1 | View Replies]

To: marktwain
The second image at the link is an example message using this cypher. It appears his cypher maintains formatting of the original message which should make cracking it all the easier. With the common pairs in the example document, it appears to be a combination of substitution and cypher key, which again is a huge hole for someone to decode the message from. Least I get the very strong impression that the FQ pair is a substitution for the space.

Cryptography is a skill of patience I don't have, but if this is the challenge, I think it's going to be pretty dang easy to break.

7 posted on 06/12/2010 7:56:39 PM PDT by kingu (Favorite Sticker: Lost hope, and Obama took my change.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: nickcarraway

“Paging Bruce Schneier, will Mr. Bruce Schneier please come to the lobby.”
Seriously, I’d just about bet Bruce could easily take it down. Check a few of his cryptogram newsletters to see what he’s about.


8 posted on 06/12/2010 7:57:34 PM PDT by sayuncledave
[ Post Reply | Private Reply | To 1 | View Replies]

To: sayuncledave

I got the first message:

“Ouyay an’tcay eakbray ymay odecay.”


9 posted on 06/12/2010 8:00:10 PM PDT by AmishDude (It doesn't matter whom you vote for, it matters who takes office.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Talisker

If you have a fixed set of symbols that you use on a block of text, those symbols are still going to be used in whatever frequency is typical for the use frequency for their substitutions for that language. What he needs to do is to have the letter substitution be changed according to some predetermined standard such as the first 100 letters of the message are encoded by the novel alphabet where A to Z = 1 to 26, the second 100 are encoded where A to Z = 5 to 26 and back through 4, etc, varying both the numbers in succeeding groups and the starting point in the novel alphabet for each. If one doesn’t know the varying group length or the start point for each group in the novel alphabet, one can’t easily look for any kind of frequency distribution for particular letters such as “e” or for common letter combinations such as “ed” “ing” “ly” and double letters such as “tt” in “letter,” “bb” in “bubble,” “dd” in “added,” etc.


10 posted on 06/12/2010 8:02:46 PM PDT by aruanan
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

techping.


11 posted on 06/12/2010 8:04:33 PM PDT by Jet Jaguar (*)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

This should take all of about a week or so.


12 posted on 06/12/2010 8:04:44 PM PDT by Oceander (The Price of Freedom is Eternal Vigilance -- Thos. Jefferson)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

brue reader....


13 posted on 06/12/2010 8:06:45 PM PDT by rolling_stone (no more bailouts, the taxpayers are out of money!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

This isn’t tech, it’s stupidity.


14 posted on 06/12/2010 8:10:21 PM PDT by bvw
[ Post Reply | Private Reply | To 11 | View Replies]

To: aruanan

Yeah, but your premise is useless. He invented a new language that only he and the second party knows. The way to crack this code isn’t to crack this by frequency of any letters or letter combinations alone, but rather comparing character frequency to all known languages, finding out what family of languages this constructed language is based on and decipher some of the cognates and frequently used words in that constructed language.

It won’t be a perfect cracked code, but you may be able to pick off a few simple words via cognates and frequently used words. All constructed languages are related to some language family or the other.


15 posted on 06/12/2010 8:28:31 PM PDT by NorthStarStateConservative (I'm just another disabled naturalized minority vegan pro life conservative.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: bvw

The ‘boys’ and ‘girls’ at Bletchley Park might differ with the author.

Anybody can make up his own personal secret code and defy another to break it. If no one else understands it then it is a shallow lesson in futility.

Like they say “The only true way to have 3 people keep a secret is to kill 2 of them”.


16 posted on 06/12/2010 8:45:30 PM PDT by xrmusn ((6/98 ) FIRE ALL INCUMBENTS)
[ Post Reply | Private Reply | To 14 | View Replies]

To: nickcarraway

The Poles will crack it in a weekend.

http://culture.polishsite.us/articles/art207fr.htm


17 posted on 06/12/2010 8:54:24 PM PDT by Gapplega
[ Post Reply | Private Reply | To 1 | View Replies]

To: NorthStarStateConservative
He invented a new language that only he and the second party knows

I guess you didn't read the article. He invented a new set of symbols that he uses to transliterate English or Arabic or whatever else has an alphabetic system of writing. This is not a new language.
18 posted on 06/12/2010 9:09:21 PM PDT by aruanan
[ Post Reply | Private Reply | To 15 | View Replies]

To: nickcarraway

So what? The VIC cipher was never actually broken: the Soviet agent who used it defected and told us the algorithm and what he and his handlers were using for keys—straddling checkerboard to convert the letters to one or two digit numbers, followed by Vigenere-style encryption of the digits, followed by, if memory serves, a round of ordinary keyword columnar transposition and one of disrupted keyword columnar transposition, followed by reconversion to letters using the straddling checkerboard.


19 posted on 06/12/2010 9:24:09 PM PDT by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know. . .)
[ Post Reply | Private Reply | To 1 | View Replies]

To: aruanan
“I guess you didn't read the article. He invented a new set of symbols that he uses to transliterate English or Arabic or whatever else has an alphabetic system of writing. This is not a new language.’

That is the way that I interpreted it as well. It is also interesting that some kind of formatting seems to be used, as the lines are of varying length.

Wouldn't it be better to have him sell this to Al Queda, and have them use the unbreakable code?

20 posted on 06/12/2010 9:26:39 PM PDT by marktwain
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-26 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson