This question was prompted by a long Wikipedia session with me reading tons of articles on cryptography, causing far more questions than it answered.
Let’s say that I and another person know each other. We plan to do something important and dangerous. We need to send messages back and forth long-distance. We conclude that all purchasable hardware and software is compromised, and therefore devise our own scheme:
- I pull out the network cable from my computer, randomly generate a huge table numbered like 1, 2, 3, 4, 5… both horizontally and vertically, filled with random alphabetic letters, fitting on a standard A4 paper.
- I print out two copies of this table.
- I destroy the computer.
- I keep one copy myself and give the other copy to the other person, who is sitting with me.
I tell him that, in order to send a message to me, or decrypt messages from me, he is to find any letter in the table corresponding to the character he needs to type in English, for example “A”, and check which number column and row it exists in. For example, it may be in the 3rd column on the 16th row. That means he is supposed to type “3” followed by a randomly picked letter followed by “16” on the blank paper, followed by another random letter. He is then to continue like this until he has a message such as:
First of all, how would anyone ever be able to tell that the letters are all nonsensical and not used for anything other than separating the numbers? And even if they did, what do the numbers mean? They have no way of knowing this unless they have a copy of our sheet which only exists in two copies in the world and was generated by an offline computer which is now physically destroyed.
And we wouldn’t be using the same column+row value each time for each letter, as they are found many times around the table.
And, what if to further complicate everything, we decide to write the messages in reverse? Or to do every other look-up in reverse, so that the columns and rows are swapped every other character? With just a few simple rules like that, it seems like they could never, ever decrypt our messages, even with the most powerful computers in the world.
I probably am making a fool out of myself here, but I seriously don’t understand how anyone, no matter how smart, given unlimited time, could ever break this cipher/encryption scheme which I just came up with quickly without having any expertise in the field. I clearly must be missing something.
2x E5-2630L 16GB 2TB SATA/480GB SSD Unmetered/1G 5
E3-1230v3 16GB 2TB SATA/480GB SSD Unmetered/1G 5
E3-1230/Cloud Server 4GB/8GB 200GB SATA 5TB/100M 5/Up to 61 IPS
E3-1270/Cloud Server 8GB/16GB 400GB SATA 10TB/100M 5/Up to 61 IPS
2xE5-2620/Cloud Server 16GB/64GB 1TB SATA 10TB/100M 5/Up to 61 IPS
E3-1231v3 8GB 2TB SATA/480GB SSD Unmetered/1G 5
E3-1230v5 16GB 2TB SATA/480GB SSD Unmetered/1G 5
E3-1270v2 16GB 2TB SATA/480GB SSD Unmetered/1G 5
E3-1270v3 16GB 2TB SATA/480GB SSD Unmetered/1G 5
E3-1275v5 16GB 2TB SATA/480GB SSD Unmetered/1G 5
I’m looking for D&D campaigns that may be based on Earth or an alternate Earth w/non-human races, but that use cities like New York or London as part of their world/story line.
Does anyone know of any/has used any such campaigns? I wouldn’t mind if it was from an older edition (3e or 3.5e – I could convert/run it as 5e).
When I collapse a cell, the title adds this weird fragment. Does anyone know how I can fix this?
(Version 12, macOS Catalina 10.15.1)
Hello Everyone @Sven
anyone can tell me about the GSA addon SERengines.com
Is it still good working or getting results?
i try to contact this site but no one can reply…
and i try to buy SERengines license but there is a requirement to buy a minimum 3-month license
how can i buy 3 months license if i don’t know how it’s working
if anyone knows about this so please let me know
Looking to buy an autoapprove/verified list of sites that will let me add maps/youtube/etc embeds
What I mean by 3-way dot product is the following:
i have never seen these weird parameters in Xevil before, I bought Serengines like 10 minutes ago, connected it and started the first project and now this happens. (the ones that are good, are actually from GSA SER regular projects, not SER-Engines) SERENGINES is the one creating these weird parameters.
Not only that, even the ones below with a status as OK ???? but had only 1 clicks and #0.0
Basically it did nothing, but still states an OK message.
I need this to work with Xevil recaptcha module, I dont wanna waste a single penny on 2captcha while I got a beast of a machine that can solve thousands of recaptchas without breaking a sweat.
So hopefully there’s a quick fix for this, i want to move forward, not backwards by buying a captcha service.
Widely discussed this week. G has made some also updates. I am seeing a few long-term ranking kw’s with downward pressure this week. Not sure what is causing it. Would love to hear from anyone else who may know what is happening.
Hi, whenever I use scrapebox with yahoo engine selected it finds massive amounts of url’s, really good ones too (after loading them up in GSA PI it’s very accurate with footprints provided from GSA SER footprint studio)
But, whenever I de-select all search engines in gsa ser project except for Yahoo.
i only get “may be blocked by search engine, and displaying proxy” or something like that?
But the thing is, I use these same proxies for Scrapebox, so I know it’s a GSA SER error… but what is the error? user-agent? i never seen options in gsa ser for user-agents, but this is the first thing that came to mind.. anyone knows if you can edit user-agents in GSA SER?