Decrypting Encrypting FAQS index Links TRNG

 

TUTORIALS  AND  EXAMPLES  ON  DECRYPTING

          Decrypt menu  

 

General concepts  

Tutorials for message 54321

 Tutorials for message 00654

Tutorials for message 45334

Tutorials for message 00034

Tutorials for message 12345

 Tutorials for message 70001

Tutorials for message 70005

 An  exercise for cryptanalysts

How to simple decrypt any file ?

 


GENERAL CONCEPTS

 

        The browser used  in all these computations  is  IE 6.0. If you use other browsers OR or a different version of the same browser,  it  doesn't  work.  The Operating System used,  is not so important as far as the program can be executed. The partners at the two sides should have exactly the same kind of  browsers in order to synchronize to each other.  To make synchronization,  the contributing partners should perform  the following checks and alignments on their  browsers:       

 

         A -Control:  Help > About Internet Explorer > read the version number. If  it  is  NOT 6.0, then don't commence.

         B -Align:     Tools > Internet Options > Advanced > Restore Defaults > Apply > OK. 

         C -Align:    View > Encoding > check "Western European (ISO)".   ("Auto Select" option should be UNchecked)

Use the "Western European (ISO)" option during all the savings, and state this condition on all of the tables.      

  

        The receiver would  retrieve the keyfiles by some internet surfing  to some sites (ON A DIFFERENT MACHINE),   which has been prearranged by the agreement of two sides in advance. The browser used at this stage should also be the same as the one which is  used in encryption and additional synchronization should be made as defined above

        NEVER do the keyfile browsing/surfing by the same machine which the practical(OTP) software is installed.  If you are working in an official building it is very probable that every surfing movement is tracked by your adversaries.  The keyset, which is browsed at an unsuspected machine will be saved  on  floppy disks, then brought to the computer where the OTP program is installed.


TUTORIAL FOR MESSAGE 54321   

 

Download & unzip  Encrypt 54321.zip  and save all the keys  into  (C:\windows\desktop\message 54321)   

 internal security number ISN:  19453208 

name of file for saving

file web address

  (click to open )

Viewing and Encoding during saving

Saving type of file

key1(54321).txt

site1

Western European (ISO)

Text File (*.txt)

key2(54321).txt 

site2

Western European (ISO)

Text File (*.txt)

key3(54321).txt 

site3

Western European  (ISO)

Text File (*.txt)

key4(54321).txt

site4

Western European  (ISO)

Text File (*.txt)

         How to save keys:  Click to site1 or site2 or site3 or site4;  then from file menu at top left, choose save as;  complete the Save Web Page prompt as shown  in the tables, to the directories stated at the first cell of their tables.        

         

        The usage of keys and encrypted files for decryption are described  at the end of this section.

 

        At this stage, encrypt  may  be easily cracked by the code crackers of  IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are  NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education  (should actually select different language texts for different keys in a  keyset),  If you are looking for a real tough pad and try your skills, you have to perform  double encrypting.


TUTORIAL FOR MESSAGE 00654       

 

Download & unzip  Encrypt 00654.zip  and save all the keys  into  (C:\windows\desktop\message 00654) 

 internal security number ISN:  19453208    

name of file for saving

file web address

  (click to open )

Viewing and Encoding during saving

Saving type of file

key1(00654).txt site1

Western European (ISO)

Text File (*.txt)

key2(00654).txt site2 Western European (ISO) Text File (*.txt)
key3(00654).txt site3 Western European (ISO) Text File (*.txt)
key4(00654).txt site4 Western European (ISO) Text File (*.txt)

        How to save keys:  Click to site1 or site2 or site3 or site4;  then from file menu at top left, choose save as;  complete the Save Web Page prompt as shown  in the tables, to the directories stated at the first cell of their tables. 

         

        The usage of keys and encrypted files for decryption are described  at the end of this section.

        

        At this stage, encrypt  may  be easily cracked by the code crackers of  IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are  NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education  (should actually select different language texts for different keys in a keyset). If you are looking for a real tough pad and try your skills, you have to perform  double encrypting.


TUTORIAL FOR MESSAGE 45334    

 

Download & unzip Encrypt 45334.zip  and save all the keys  into  (C:\windows\desktop\message 45334).

 internal security number ISN:  19453208     

name of file for saving

file web address

  (click to open )

Viewing and Encoding during saving

Saving type of file

key1(45334).txt site1

Western European (ISO)

Text File (*.txt)

key2(45334).txt site2 Western European (ISO) Text File (*.txt)
key3(45334).txt site3 Western European (ISO) Text File (*.txt)
key4(45334).txt site4 Western European (ISO) Text File (*.txt)

         How to save keys:  Click to site1 or site2 or site3 or site4;  then from file menu at top left, choose save as;  complete the Save Web Page prompt as shown  in the tables, to the directories stated at the first cell of their tables.       

         

        The usage of keys and encrypted files for decryption are described  at the end of this section.

 

        At this stage, encrypt  may  be easily cracked by the code crackers of  IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are  NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education   (should actually select different language texts for different keys in a keyset).  If you are looking for a real tough pad and try your skills, you have to perform  double encrypting.


TUTORIAL FOR MESSAGE 00034

 

Download & unzip Encrypt 00034.zip  and save all the keys  into  (C:\windows\desktop\message 00034)  

 internal security number ISN:  19453208     

name of file for saving

file web address

  (click to open )

Viewing and Encoding during saving

Saving type of file

key1(00034).txt site1

Western European (ISO)

Text File (*.txt)

key2(00034).txt site2 Western European (ISO) Text File (*.txt)
key3(00034).txt site3 Western European (ISO) Text File (*.txt)
key4(00034).txt site4 Western European (ISO) Text File (*.txt)

         How to save keys:  Click to site1 or site2 or site3 or site4;  then from file menu at top left, choose save as;  complete the Save Web Page prompt as shown  in the tables, to the directories stated at the first cell of their tables.       

         

        The usage of keys and encrypted files for decryption are described  at the end of this section.

        

        At this stage, encrypt  may  be easily cracked by the code crackers of  IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are  NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education  (should actually select different language texts for different keys in a keyset).  If you are looking for a real tough pad and try your skills, you have to perform  double encrypting.


TUTORIAL FOR MESSAGE 12345

 

Download & unzip Encrypt 12345.zip  and save all the keys  into  (C:\windows\desktop\message 12345)

 internal security number ISN:  19453208     

name of file for saving

file web address

  (click to open )

Viewing and Encoding during saving

Saving type of file

key1(12345).txt site1

Western European (ISO)

Text File (*.txt)

key2(12345).txt site2 Western European (ISO) Text File (*.txt)
key3(12345).txt site3 Western European (ISO) Text File (*.txt)
key4(12345).txt site4 Western European (ISO) Text File (*.txt)

         How to save keys:  Click to site1 or site2 or site3 or site4;  then from file menu at top left, choose save as;  complete the Save Web Page prompt as shown  in the tables, to the directories stated at the first cell of their tables.        

 

         The usage of keys and encrypted files for decryption are described  at the end of this section.

 

        At this stage, encrypt  may  be easily cracked by the code crackers of  IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are  NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education    (should actually select different language texts for different keys in a keyset).  If you are looking for a real tough pad and try your skills, you have to perform  double encrypting.


TUTORIAL FOR MESSAGE 70001

 

Download & unzip Encrypt 70001.zip  and save all the keys  into  (C:\windows\desktop\message 70001)  

internal security number ISN:  19453208    

name of file for saving

file web address

  (click to open )

Viewing and Encoding during saving

Saving type of file

key1(70001).txt site1

Western European (ISO)

Text File (*.txt)

key2(70001).txt site2 Western European (ISO) Text File (*.txt)
key3(70001).txt site3 Western European (ISO) Text File (*.txt)
key4(70001).txt site4 Western European (ISO) Text File (*.txt)

         How to save keys:  Click to site1 or site2 or site3 or site4;  then from file menu at top left, choose save as;  complete the Save Web Page prompt as shown  in the tables, to the directories stated at the first cell of their tables.    

 

         The usage of keys and encrypted files for decryption are described  at the end of this section.

 

        At this stage, encrypt  may  be easily cracked by the code crackers of  IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are  NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education  (should actually select different language texts for different keys in a keyset).  If you are looking for a real tough pad and try your skills, you have to perform  double encrypting.


TUTORIAL FOR MESSAGE 70005

 

Download & unzip Encrypt 70005.zip   and save all the keys   into  (C:\windows\desktop\message 70005)  

internal security number ISN:  19453208    

name of file for saving

file web address

 (click to open )

Viewing and Encoding during saving

Saving type of file

key1(70005).txt site1

Western European (ISO)

Text File (*.txt)

key2(70005).txt site2 Western European (ISO) Text File (*.txt)
key3(70005).txt site3 Western European (ISO) Text File (*.txt)
key4(70005).txt site4 Western European (ISO) Text File (*.txt)

        How to save keys:  Click to site1 or site2 or site3 or site4;  then from file menu at top left, choose save as;  complete the Save Web Page prompt as shown  in the tables, to the directories stated at the first cell of their tables.  

      

        The usage of keys and encrypted files for decryption are described  at the end of this section.

        At this stage, encrypt  may  be easily cracked by the code crackers of  IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are  NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education  (should actually select different language texts for different keys in a keyset) If you are looking for a real tough pad and try your skills, you have to perform  double encrypting.


AN EXERCISE FOR CRYPTANALYSTS

 

 Attention  Double encrypted  !

Download   (top secret).zip                 *Top Secret message in English

Question: What's the plaintext ?

        The contents of this file is about  an  unbelievable and shocking truth  about  some very important occurrence which had  happened in  3rd.  millennium,  (Hope you can guess the subject !).  If you fail to crack the code now; then what will you do in the future, if some illegal groups use this system to communicate with each other?. 

        Sooner or later somebody should arrange an attack on this system. Nobody has the right to act as nothing has happened, since we are not ostriches and cannot put our heads in the sand during a threat.

        We know that there are potent code crackers in some Western Agencies and the number of  the employed mathematicians  reach to thousands,  so we are quite  sure that  this kind of coding system will  be cracked by some methods  or else it may cause a great nuisance in the future.

     

        If the method used in this type of encryption doesn't delight your taste,  why not try cross encryption  for your deeper satisfaction?.  Divide into two groups and send each other  cross encrypted  files to crack each others code. We are quite sure,  within a short period of time you will also find some method,  to crack cross encrypted coding.

 

 

 

 

 


HOW  TO  SIMPLE  DECRYPT ANY  FILE ?

 

        Suppose you have  a  "C:\windows\desktop\message 00034"  directory.  In this directory; according to the definitions and procedures told above,  there should be the following files saved and downloaded

   

key1(00034).txt

key2(00034).txt

key3(00034).txt

key4(00034).txt

Encrypt(00034).enc

 

Do the following  step by step for decryption;

 

Open the  PracticalOTP  program by double clicking its icon on the desktop.

1_   Click Decrypt menu. 

2_   Enter the eight digit Internal security number.

 

3_   Click key1.txt,  pass to ,C:\windows\desktop\message 00034 double click  key1(00034).txt  to enter the related first key.

4_   Click key2.txt,  double click  key2(00034).txt  to enter the related second key.

5_   Click key3.txt,  double click  key3(00034).txt  to enter the related third key.

6_   Click key4.txt,  double click  key4(00034).txt  to enter the related fourth key.

 

7_   Click  compute main key  button,

Some time will pass for computing the main key,  the  working time will depend on the size of the key1.txt,  key2.txt, key3.txt  and  key4.txt  

8_  Click  Encrypt.enc  button,  a  file prompt will be opened  to choose encrypted file.  Double click on  Encrypted Encrypt (00034).enc  file to load  it into the program,  this is the encrypted practicalOTP  file which is transferred or downloaded through open channels.

9_  Click  compute decrypt.txt  button,

Some time will pass for computing the decrypt.txt  file,  the  working time will depend on the size of  the contributing files.

 

10_  Opened and readable  decrypt.txt  file will always  be saved into the root  directory  C:\  automatically.

11_  Click  Exit  and exit the  practicalOTP  program.

12_  Immediately  go  to  the  root directory  C:\  and  by renaming  function of  windows,  change the name of  decrypt.txt  to a  new name;  message (00034).txt. You should  do this procedure in order NOT to lose the encrypted file since the encrypted file will always be saved into the root directory with the same name and  if you neglect doing  this renaming  operation,  next time the program operates, the old decrypted file will be replaced by the new decrypted file and the previous file will be lost. 

 

IMPORTANT:

        Sometimes the lines of  message (00034).txt  may be  untidy AND  ugly  in  NOTEPAD,  a  single line may take more than  80 characters (or up to 250 or more). You may correct  this situation as following:  

        Open the Microsoft Word program >  from open  menu  at  files of type section, click text files > choose   message (00034).txt  and  load it  >  make the necessary formatting  as  you wish  >  save this  file as  Word Document  in  some  directory.