It was 1961 when, in the U.K., the Cohen couple was arrested for espionage. The couple, Lona and Morris, were Soviet spies. She and her husband were both Americans but became enamored with the ideology of Communism and left the faith of their families.
The wife, Lona, was chosen by the Soviet Union to carry stolen classified atomic bomb schematics from Los Alamos to New York. She was very skilled and pioneered spy techniques that would later be taught in the U.S.S.R. The United States eventually discovered that she was successful in transporting the complete plans of the U.S. atomic bomb.
After more espionage arrests in the U.S., the couple fled to Poland. Due to their espionage prowess, the Soviet Union sent them on many missions all over the world and communicated via the most secure encryption. Note that this is way before 2048 bit computer encryption existed.
They later moved to the U.K. where they were eventually found out. During their arrest spy catcher Smith found in her bag many tools for espionage, one of which was the most secure encryption which is uncrackable. This is the same level security you can use for securing your secret passwords, accounts and documents from being stolen.
The uncrackable encryption device is really a method. It is called a “One-Time Pad” for it’s use of a one time encryption key. It encrypts all indices separately which requires a key just as long as the document meant to encrypt. This makes it such that even if one discovers part of the document’s contents, the rest of the document is still safe.
It is also very applicable for off-the-grid situations because it doesn’t require a computer. Due to the absolute secrecy and ease, it is my go-to for securing my passwords for my safe and and bug-out-bag.
So how does it work?
You take a message and convert it to a numeric value. Take for example the word “spies”
S is the 19th letter of the alphabet. P is the 16th letter and so on and so forth. So the message “spies” becomes
Message : SPIES
Message (Numeric) = [19] S [16] P [9] I [5] E [19] S
From here we add an extra number picked randomly to each of these letters. This forms the key. So say the key was D G X L D then this in numeric form would be
Key (Numeric) = [4] D [7] G [24] X [12] L [5] E
We then add these values to form Message + Key,
Message + Key = 23 23 33 17 24
Now, if we are only using our alphabet, we have a total of 26 characters and we need to take out the remainder from the answer because there are not 33 Letters from the Message + Key. This is called taking Mod(26). It is basically taking the division of 26 then displaying the remainder. So for index 3 or number 33 we take 33 – 26 = 7
When we do this we get
Message + Key mod(26) = 23 23 7 17 24
We can then convert this back to a text via the letter index we used before. The 23rd letter of the alphabet is W, the 6th letter of the alphabet is F, and the 17th letter of the alphabet is Q. So we can create our cipher text this way
Cipher Text = W W G Q X
Notice that the first two letters of the Cipher text are the same letter but are not the same in the message text “spies”. This is because each letter of the message is encrypted with its own encryption letter.
We can do this all in one to make see the process flow
S P I E S
[19] S [16] P [9] I [5] E [19] S Message (Numeric)
+ [4] D [7] G [24] X [12] L [5] E Key
= 23 23 33 17 24 Message + Key
= [23] W [23] W [7] G [17] Q [24] X Message + Key (mod 26)
= W W G Q X Ciphertext
We can do the exact same process but in reverse.
W W G Q X Cipher text
23 [W] 23 [W] 7 [G] 17 [Q] 24 [X] Ciphertext
– 4 [D] 7 [G] 24 [X] 12 [L] 5 [E] Key
= 19 16 -17 5 19 Ciphertext – Key
= 19 [S] 16 [P] 9 [I] 5 [E] 19 [S] Ciphertext – Key (mod 26)
S P I E S Message
It is just as easy as that! It is uncrackable and simple. Perfect for a grid down situation or ultra secrecy.
I have encrypted all my important passwords this way. I have one set ready to go. Now, I have the list of Keys in my Bug Out Bag and my actual passwords stored away on my person. It is important to keep these separate
I would also suggest putting one extra copy that is populated with a different key in a safe and the ciphertext in a separate location.
With this tool, you should be able to access your passwords, account numbers, social security numbers, and what ever documents you want to protect with absolute secrecy.
Created an excel sheet to easy produce these keys and cipher texts for you. Make sure to be a patron to gain access!