Posted on 02/04/2018 1:16:14 PM PST by SunkenCiv
I clicked and read that.
Caesars wheel was even simpler than the Spartan message rods.
You're right. A true OTP used as a cypher needs to be as near to truly random as you can make it. That pretty much eliminates using computers because computers are notoriously bad at generating actual randomness.
That said, if your adversary is not a nation-state or a professional cryptographer, you can do some really neat things with existing books and data of that sort to create messages that only the truly dedicated are going to be able to do anything with. If you're able to set things up ahead of time, and the information you're wanting to encrypt is fairly time-sensitive, (meaning that a year from now I don't care if anyone can decipher the message), using computers and modern cryptographic tools, you can set up some nifty stuff using deterministic processes as a basis for symmetric cypher keys. Then again, if you're serious about your crypto, you'll just create PGP keys and use that.
I am still, to this day, astounded that we don't routinely use cryptography based on public-key crypto in our day to day lives. It is not rocket science, and can easily be implemented on modern computer systems. Hell, my email program has have PGP/GPG integration built right in for years. Problem is, very few people are similarly up to speed.
Linear A is older, probably used as the basis for Linear B, but clearly in a different language, and alas, there’s no bilingual, and many think the number of surviving tablets makes it unlikely that it will be cracked. Of course, there have been translations, but they haven’t been accepted, a phenomenon analogous to trying to identify Jack the Ripper.
Yeah, if the dynasty hadn't run out of good DNA, a couple more generations of marriages would have brought most of the other half of the world they didn't rule under their control. Astounding.
another antique method was to shave the head of a trusted slave, write the entire message on the scalp, and wait until the hair grew back before sending them on their way.
Those were not time-critical messages, of course.
The International Spy Museum... I just tried to surf to their webpage, and as I waited for it to load, a car sped up, slowed down, sprayed the house with automatic weapons fire, then sped off! ;^)
Here’s the best known British spy network from Eliz II’s time:
The Cambridge Five
https://www.spymuseum.org/education-programs/news-books-briefings/background-briefings/the-cambridge-five/
I’ve read that the best tool of the code maker is guile.
I first learned what little I know about it in some kid’s book of my youth, you know the kind, there’s a small group of brainy kids who try to outsmart everyone around them, yet they’re often spending the middle chunk of each story being outsmarted by the bully kid, who turns out to be the only real genius (an unintended feature of the genre), who of course gets his in the end. From that book I learned about frequency tables used to break ciphers (which are simple letter substitution systems) and how to build cipher wheels and such. What fun. ;^) ETAON...
My pleasure!
One of my ancestors! No wonder I’m so clever! LOL!
‘Face
Pound pastrami, can kraut, six bagelsbring home for Emma.
Sherdlu
"The ships are lost. Mindarus is dead. The men are starving. We don't know what to do."
Yup it’s in your genetic code — hey!
But did you know? - the precipitation in Portugal pelts primarily on the plateau.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.