Hiho, thank you! Really appreciate! I worked on a chapter of the cryptool book were we added a list from a colluege showing the keyspace sizes of many classical ciphers and machines. Also, we made tables showing the difficulty to break these. When the book is published, I could create such a video :-) Greetings, Nils
Hallo Nils. I have a feature idea: Numbers to Colours. The two electronic colour codes are The 10 colour/digit code used for electronic components and the 25 pair colour code used for conductors. Both are described in wikipedia. Ciao, Molly.
Hiho, I know this color coding, because I am also (hobby) with electronics (must find time for it again) :-)) There are many such decoders on the internet. I don't know if we need it in CT2. What do you need it for? Greetings, Nils
@@CryptographyForEverybody __ Thank you Nils, I write puzzles for a literary group and always hide a second message somewhere in the main scenario. I am particularly fond of historic and forgotten encoding schemes. I wonder if you have plans to add ancient number systems to possible outputs. Maya and Babylonian numbers are fun (although not strictly encryption, they did have to be cracked by studious experts). There are many resources available to me for automation and ideas, but CT2 is always at the top of the list. -- Molly J.
Got a a question. Is there a simple, easy to use cipher. That can be taught to a bunch of high school dropout devil dogs. That can be used in a high pressure tactical situation? I will emphasize that it must be easy and quick to use. That can be transmitted across radio waves.
Hiho, For tactical use, the U.S. military used the M-94. See my video or just google for it :-) It is a cylindrical hand device. If you cannot "build" such a device you may also have a look at the columnar transposition cipher or (better) the double columnar transposition cipher. For tactical use, these ciphers should be "secure enough". Also, you could use a book and create a book cipher. I have videos of all of these ciphers on my channel. Especially the book cipher is nearly impossible to break without having the proper book. And a book can be carried easily, even in the fields. Hope that helps? Greetings, Nils
Hello Georgestein7484, Ah that is interesting! I didn't know. Do "hand methods" also fall under this restriction or only "strong encryption" (modern ciphers)? Why is the MRHS allowed to send the encrypted Enigma messages? Did they need a "special allowance"? See www.radiomarine.org/mrhs-events Thanks for the info :-)
MRHS was not broadcasting on amateur radio frequencies. There are encrypted messages for military and other concerns on non-amateur frequencies. There are packet, DMR, etc transmissions on amateur frequencies. One could say they are encrypted, but with common receiving equipment/software they are allowed because they can be received and understood by anyone. Secret messages are different because they are not readable by any and everyone. I do not know if MHRS needs special permission or not. I will say it would be fun if we could use encoded messages on the ham bands, but from a security perspective the US could be at high risk from bad guys doing things that could not be tracked and monitored. Take care, George
I think I answered my own question. Block 5 Chiper Just for fun here is a sample. Let see if you can do your worst. HGFMWE UIWYLC FLJIPU WUOLXP FTGTUZ. ECYJRH KTHYIE. WMNRBO JHOLNO. HYOMQJ SXCFAX. MYADBX SOLVE IT FOR FUN? Idk
Hiho, In the component, we did not implement a visualization - so you cannot see the words. The component used the dictionary of several 1000 words and selected for each keyword letter the first occurnce of a word starting with the current letter. Does that answer the question? :-) Greetings, Nils
Hi Nils, I have questions about the keyword and the 10x10 grid. 1. Since the template has a dictionary component, wouldn't each encryption force a new 10x10 grid to be created? How does the other person get the 10x10 grid, indeed if it is changing? 2. You added q, z, and x to the keyword. You did this because the 10 words might not have a q, z. or x in them. Wouldn't this fact weaken the key somewhat? 3. Does the program alert the user if all letters were not used? 4. If the keyword was 9 letters and you added q, z, and x to it, making it 12 letters, how is it placed in the grid? If words are not 10 letters in length, then what is filled in empty cells? 5. Can one enter their own words, numbers, punctuations into the grid? 6. What is the reason that the grid cannot be randomly generated? Why does the ACA say no. Thanks, Nils, for all that you do. Just pure fun learning new things. Regards, George
As always, great work. How about a ranking [security] of classical ciphers vid? Or report on current day classical cipher work/improvements.
Hiho, thank you! Really appreciate!
I worked on a chapter of the cryptool book were we added a list from a colluege showing the keyspace sizes of many classical ciphers and machines. Also, we made tables showing the difficulty to break these. When the book is published, I could create such a video :-)
Greetings,
Nils
Hallo Nils.
I have a feature idea: Numbers to Colours.
The two electronic colour codes are
The 10 colour/digit code used for electronic components and
the 25 pair colour code used for conductors.
Both are described in wikipedia.
Ciao, Molly.
Hiho,
I know this color coding, because I am also (hobby) with electronics (must find time for it again) :-))
There are many such decoders on the internet.
I don't know if we need it in CT2. What do you need it for?
Greetings,
Nils
@@CryptographyForEverybody __ Thank you Nils, I write puzzles for a literary group and always hide a second message somewhere in the main scenario. I am particularly fond of historic and forgotten encoding schemes. I wonder if you have plans to add ancient number systems to possible outputs. Maya and Babylonian numbers are fun (although not strictly encryption, they did have to be cracked by studious experts). There are many resources available to me for automation and ideas, but CT2 is always at the top of the list. -- Molly J.
Got a a question.
Is there a simple, easy to use cipher.
That can be taught to a bunch of high school dropout devil dogs.
That can be used in a high pressure tactical situation?
I will emphasize that it must be easy and quick to use.
That can be transmitted across radio waves.
Hiho,
For tactical use, the U.S. military used the M-94. See my video or just google for it :-) It is a cylindrical hand device. If you cannot "build" such a device you may also have a look at the columnar transposition cipher or (better) the double columnar transposition cipher. For tactical use, these ciphers should be "secure enough". Also, you could use a book and create a book cipher. I have videos of all of these ciphers on my channel. Especially the book cipher is nearly impossible to break without having the proper book. And a book can be carried easily, even in the fields.
Hope that helps?
Greetings,
Nils
US amateur radio operators are not allowed to transmit any encrypted messages. Perhaps you are speaking of some other country or radio service.
Hello Georgestein7484,
Ah that is interesting! I didn't know.
Do "hand methods" also fall under this restriction or only "strong encryption" (modern ciphers)?
Why is the MRHS allowed to send the encrypted Enigma messages? Did they need a "special allowance"? See www.radiomarine.org/mrhs-events
Thanks for the info :-)
MRHS was not broadcasting on amateur radio frequencies. There are encrypted messages for military and other concerns on non-amateur frequencies.
There are packet, DMR, etc transmissions on amateur frequencies. One could say they are encrypted, but with common receiving equipment/software they are allowed because they can be received and understood by anyone. Secret messages are different because they are not readable by any and everyone.
I do not know if MHRS needs special permission or not.
I will say it would be fun if we could use encoded messages on the ham bands, but from a security perspective the US could be at high risk from bad guys doing things that could not be tracked and monitored.
Take care,
George
I think I answered my own question.
Block 5 Chiper
Just for fun here is a sample.
Let see if you can do your worst.
HGFMWE UIWYLC
FLJIPU WUOLXP
FTGTUZ. ECYJRH
KTHYIE. WMNRBO
JHOLNO. HYOMQJ
SXCFAX. MYADBX
SOLVE IT FOR FUN?
Idk
I must have missed something. Where is the grid of ten words?
Hiho,
In the component, we did not implement a visualization - so you cannot see the words. The component used the dictionary of several 1000 words and selected for each keyword letter the first occurnce of a word starting with the current letter.
Does that answer the question? :-)
Greetings,
Nils
@@CryptographyForEverybody Thank you Nils. Is there a way to retrieve the ten words so users can practice the cipher by hand?
Hiho,
tomorrow :-) I just added an output that shows which words are used.
Greetings,
Nils
@@CryptographyForEverybody -- Thank you Nils !
You are SO FAST !
Hi Nils,
I have questions about the keyword and the 10x10 grid.
1. Since the template has a dictionary component, wouldn't each encryption force a new 10x10 grid to be created? How does the other person get the 10x10 grid, indeed if it is changing?
2. You added q, z, and x to the keyword. You did this because the 10 words might not have a q, z. or x in them. Wouldn't this fact weaken the key somewhat?
3. Does the program alert the user if all letters were not used?
4. If the keyword was 9 letters and you added q, z, and x to it, making it 12 letters, how is it placed in the grid? If words are not 10 letters in length, then what is filled in empty cells?
5. Can one enter their own words, numbers, punctuations into the grid?
6. What is the reason that the grid cannot be randomly generated? Why does the ACA say no.
Thanks, Nils, for all that you do. Just pure fun learning new things.
Regards,
George