In my previous lesson, I explained how the One-time pad enciphering technique worked, and how by using it multiple times (and even in reverse), it can be a fairly effective means of hiding messages and personal notes from those you wish to conceal them from, and how it can even be used to create more secure passwords.
The technique in this blog uses the same basic concept as One-time pad, only it dramatically increases the list of characters utilized, making it WAY more secure!
These are the number values of each character when using my technique:
As you can see, it is WAY more complicated than One-time pad, and (AFAIK) it includes every character you can enter on a regular (English-language) computer keyboard, without having to enter any codes.
(Such as HTML decimal codes.)
When using this technique, if the total value exceeds 47, you subtract it by 47.5 to get the proper result, and if it is negative, you add 47.5.
(Similar to One-time pad.)
Here is the same (unenciphered) text I used as an example in lesson 1:
......Souzouryoku ga Tarinaiyo -Denshousha Higana
And this is the same text, enciphered using the same cipher word as in lesson 1 (Shark), only using this lesson's technique, rather than One-time pad:
Qf(piQ/Ya(6!_e<2!a"US
K*+5RSe<*So|"0YYa@/Ra.+.RX_
As you can see, unlike when One-time pad is used, the end result looks nothing like the original text, nor the cipher used to encipher it.
Just like how the enciphering process works the same way as One-time pad, so does the deciphering process, aside from the fact that all characters (even spaces) are used, and are case-sensitive, unlike in One-time pad, which uses only letters, ignores all other characters, and is not case-sensitive.
Because of these differences, this technique is WAY more secure than One-time pad, and if security is your priority (rather than ease of use), then this technique is the way to go, whether it's being used to encipher something, or to create a secure password.
(BTW, passwords should ALWAYS include both upper and lower case letters, numbers, and non-alphanumeric characters as well, for optimum security.)
As with One-time pad, this technique can also be made more effective by using it on the same text multiple times, including by applying it in reverse.
Here is an example of the same enciphered text from above, with an additional cipher (the word "Archosaur" also applied to it, in reverse:
Fz'8>Z%u<Pzk-g+huW$gT"qsL!Hywbu'vdTN*.vL? Eby!lk
Again, nobody could recognize this as the original text without knowing both of the ciphers, the technique used to apply them, and how each of them were applied.
(Meaning through addition or subtraction.)
Anyway, that's it for this lesson.
In the next lesson, I'll teach you about different ways to make the most out of both my enciphering technique from this blog, as well as One-time pad, and also give ideas for developing enciphering techniques of your own.
true. but, some people may be interested in learning how to do this themselves without google.
Draconid_Jo
04 Feb 2020 03:05
In reply to Gemini Guardian
Thanks Mimi!
Still, if the rest of the Blogmins agree with Thi, I suppose it's pointless to argue about it. (My Blog will be seen by some people at least, even if it isn't Featured.)
UwUQueen
07 Feb 2020 08:55
In reply to Draconid_Jo
I agree with you.
Draconid_Jo
12 Feb 2020 00:48
In reply to UwUQueen
*parameters, not "perimeters", lol! (I was in a bit of a hurry at the time, lol!)
Also, I corrected the issue with the link to the 2nd part of my Stat Calculation Blog.
(I had made that Blog before they changed the command for making links to Blogs.)
Draconid_Jo
09 Feb 2020 03:52
In reply to UwUQueen
Really?
Thanks!!!
BTW, Thi had a very similar reason for rejecting this Blog, after Rlad had originally decided to Feature it: