First, how could anyone say that the lyrics
they make no sense and are not used for anything other than separating
It requires an intuitive jump. The cryptographer, when reviewing the data for patterns, will notice that there are certain numerical tuples that are repeated regardless of the alphabetic character. Once they break the frequency count to consider the numerical tuples separately from the characters, it becomes intuitively obvious that the characters are filled.
Also, if the encoder is selecting "random" the character to insert, it will not be random. He would need a computer to choose characters with something related to true randomness, and he already destroyed his computer in step 3.
And even if they did, what do the numbers mean?
Again, frequency counts. How often is each numerical tuple repeated? Make a graph. What language is most likely to be coded? English? Well, then assume that the most common tuple is a & # 39; t & # 39 ;. The second most common is a & # 39; or & # 39 ;. Decipher as if they were true and see if textual patterns arise. Don't you get patterns? Shake them and try & # 39; or & # 39; first and & # 39; t & # 39; second, is that better? Repeat the process until the clear text is agitated.
They have no way of knowing unless they have a copy of our sheet
that only exists in two copies in the world and was generated by a
Offline computer that is now physically destroyed.
No, it can be inferred from the encrypted text. Its system is essentially monoalphabetic encryption, one of the easiest to decrypt.
And, if to complicate everything further, we decided to write the
messages backwards? Or do any other search in reverse, so that
Are columns and rows exchanged every other character? With only one
few simple rules like that, it seems like never, never
decipher our messages, even with the most powerful computers in the
You are still describing a replacement encryption, which are demonstrably fallible. You can try to read about the career of Elizebeth Friedman, who cracked codes like the one used by organized crime and the Germans in the 30s and 40s.
I'm probably making a fool of myself here, but seriously not
I understand how anyone, no matter how intelligent, with unlimited time,
I could break this encryption / encryption scheme that I just found
quickly without having any experience in the field.
That is such a common problem that we have a rule that describes it; Schneier's Law:
"Anyone, from the most clueless fan to the best cryptographer, can create an algorithm that he cannot break himself."