Smart browsing tip If you arrived at this page from a search engine, click here to go to the Spy & CounterSpy home page, which gives you full access to all the free features at our site. |
... ... |
How to use one-time pads |
... |
Step 1: Create the
key... |
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |
01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 |
Now you're ready to create a key.
First, write down a series of random alphabet characters, such as
HLMSEZRBHPSJOTDW. |
Use the character |
Step 2: Format your
message... Guidelines... |
Use a pointer |
Step 3: Encrypt your
message...
The encrypted message 1319 1841 2707 0124 1430 is ready to be sent to our recipient. And we can sleep peacefully knowing that it cannot be cracked by anyone except the recipient. |
To decrypt the |
Decrypting the message...
Here's how we subtract 0526 from 1841. |
... |
About security... |
The first four-digit |
How to test your skills... |
|
... Spy school for the rest of us. |
|
Back to Home
Page
|
Here is the small print. It appears
here because we have found that maintaining a corporate front is the only way we
can protect ourselves against interference by governments and their agencies.
The legal underpinnings of our corporate front are our first line of
defense against audit-attacks and other methods of economic warfare that the
authorities use to suppress dissent, protest, and activism. They are also
determined to prove their hypothesis that Spy & CounterSpy is funded
by a foreign intelligence agency or terrorist group but our double entry
accounting record of corporate revenue and expenses is our shield against
fabricated evidence by an overzealous investigator or case officer. |