CODES AND CYPHERS


NOTES

VULNERABILITIES AND SECURITY CONSIDERATIONS

  1. A possible method of reading the plaintext would be by gaining access to the computers used by either end and locating the key files or plaintexts from that machine, so it is important to delete all plaintext and key files after sending.
  2. The re-use of a key text can raise the possibilities that a plaintext can be recovered
  3. Another vulnerability is if the uses selects a key text that can be guessed by a person familiar with their literary preferences.

INSTRUCTIONS For ENCRYPTION

  1. After installing PYTHON3, and the IDE (Development Environment tool).
  2. Create a folder on two USB sticks or similar memory devices, and copy the cypher program on to each.
  3. Start IDLE program

  4. IDLE PROGRAM select window
    From the IDLE top-bar menu: FILE: OPEN: then traverse to the folder containing the program and select OPEN:

  5. Select the RUN button:

  6. Select ENCRYPT:

  7. Select "Select Text File" Button

    and traverse to the plaintext file and select OPEN

  8. Repeat the above, selecting the key file

  9. A file of name format: Enc_(Day)_(Month)_(Hour)_(Minutes)_(Seconds)_(Year).txt is created in the XXXX folder
    The format is a series of numbers separated by spaces. DO not edit or change the file content, but it may be copied and pasted into another file or email body.
    81 102 112 149 84 113 133 107 115 60 72 106 104 101 114 130 153 72 126 108 99 116 156 131 126 143 129 117 100 154 125 106 115 114 120 139 60 141 113 118 149 83 121 114 118 115 94 130 135 72 100 106 119 118 134 28 101 103 134 145 117 117 116 154 7 116 138 148 131 104 116 140 117 109 60 105 112 117…….

INSTRUCTIONS For DECRYPTION
…. notes produced so far. --- work in progress \