Now you can view the Radio Preppers forums on your mobile devices using the Tapatalk application!
I would also like your feedback on the new logo, thanks!
Gil.
Buy me a coffee: https://ko-fi.com/gilgsn
Paypal:
https://www.paypal.com/biz/fund?id=WEYR7GMA494QL
YouTube:
https://www.youtube.com/c/radioprepper
Twitch: https://www.twitch.tv/radioprepper
Shirt & Mug:
https://teespring.com/stores/radio-preppers
Patreon:
https://www.patreon.com/radioprepper
Odysee:
https://odysee.com/@RadioPrepper:d
Facebook:
https://www.facebook.com/groups/radiopreppers/
Thingiverse:
https://www.thingiverse.com/Radio_Prepper
Send Bitcoins to: bc1qc5jq4dxt7359sh80lkv9v8rlsgnh322hmn6xyc
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuoteYou prob can handle 3, 4, & 5 char words in your conquered char list of 15, right?
QuoteYou need just practice and you start hearing it. Not consciously, but unconsciously. You just write it down and you see that your guess was correct. You are surprised. It's like your brain does not belong to you. You type what you consider right, and you are amazed that your brain told you to type this variant and not the other.
By the way, this is one more reason to learn Morse code. You can't encrypt your voice, at least not without exotic hardware and software. After a natural or man-made disaster, our country could be a prime target for invasion. I know, extremely unlikely.. So thought many Europeans in 1939. Sending a coded message with a simple and small CW radio might one day be a life saver.
DO NOT send encrypted messages over the airwaves, it is illegal!
I have always been interested in encryption theory. Surprising, since I never liked puzzles or crosswords. Not to mention my poor math skills. For some reason I have always been driven to learn obscure, odd or outdated skills. Even though I am a programmer by trade, the level of complexity in encryption software is way over my head. I've had a PGP key for about fifteen years, but to my dismay, nobody ever sends encrypted messages but for the occasional server password; and that may have been two or three emails in ten years. Had I not insisted on it, I would have received none. You would think this feature would be built in every email program, but it isn't. You must add a plugin to your mail client, if one is even available. I know Evolution on Ubuntu has it built in, and Pegasus Mail on Windows has a plugin, my Mac does too. But computer encryption is not the subject today.
Let's see how it is done. It is pretty easy:
You need a way to produce random letters. These random letters will be the key used to code and decode the message. Do not rely on yourself or a computer to produce true randomness. Typing random keys on your keyboard doesn't work, it won't be truly random. Good for practice, but not for real messages. I would suggest putting letters from a Scrabble game in a bag and shake it vigorously. Pick one letter (without looking!), write it down. Put it back, repeat. Write down your pad in groups of five letters, like so:
GEXOJ AXYEN LOWHD AWQJD UBRWJ
You need as many letters as your intended message. Here is a one-time-pad generator, for practice (set group length and key length to 5).
Encoding:
Now, let's say your message is HELLO. Our first key group is GEXOJ.
HELLO is the message.
GEXOJ is the key, called a one-time-pad because it can be used for only one message.
We are going to count to the position of the letter H, but starting at zero, not one.
A B C D E F G H
0 1 2 3 4 5 6 7........ Etc...
Here is the whole alphabet to help you:
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 |
H=7.
Our first key letter is G, and G = 6.
Add the two: 7+6=13 = N.
We keep going: E=4 + E=4 = 8 which gives I.
L=11 + X=23 = 34 ! Ha, problem! The alphabet has only 26 letters.
No problem, when we hit 26, we go back to A. 27=B, 28=C, etc. So, 34=I.
L=11 + O=14 = 25 = Z.
O=14 + J=9 = 23 = X.
Here is another way to look at it:
Position | 7 | 4 | 11 | 11 | 14 |
Message | H | E | L | L | O |
Position | 6 | 4 | 23 | 14 | 9 |
Key | G | E | X | O | J |
Position | 13 | 8 | 34 | 25 | 23 |
Encrypted | N | I | I | Z | X |
Our secret message is NIIZX.
Now, let's decode it:
We do the same thing in reverse...
(If a number is negative then add 26 to make the number positive.)
Encrypted | N | I | I | Z | X |
Position | 13 | 8 | 34 | 25 | 23 |
Minus (key) | 6 | 4 | 23 | 14 | 9 |
Equals | 7 | 4 | 11 | 11 | 14 |
Message | H | E | L | L | O |
The encrypted message is as random as the key is. Therefore, as far as I know, there is no code breaking method available that could possibly crack it. Your message is of course only as safe as the key. If the key is truly random, has not been seen by anyone except you and the recipient and was used only once then destroyed, then your message is safe!
Gil.