h a l f b a k e r yNot so much a thought experiment as a single neuron misfire.
add, search, annotate, link, view, overview, recent, by name, random
news, help, about, links, report a problem
browse anonymously,
or get an account
and write.
register,
|
|
|
|
This isn't a cipher, it's a code. Ciphers are generated by an algorithm; codes are a look-up table. |
|
|
This idea seems to combine all the advantages of being
cumbersome and tedious with the clear benefits of being
insecure. |
|
|
//access to a good library//
Sp: "the internet".
Cumbersome and tedious (to borrow from
[MaxwellBuchanan]) would have worked well, before
computers came along, but these days not so much. |
|
|
//This isn't a cipher, it's a code// |
|
|
I have plenty of books in my house, and many more in the libraries within half an hours walk of here, which have not been digitised and are not available online. So I think it should be fairly easy for me to make an encoded message that requires library access and not just internet access. |
|
|
But then you require the other person to have access to a
library that has not only the same books, but the same
editions of those books. |
|
|
What if you only have the Bible, Shakespeare, and 10 vinyl records ? |
|
|
You can cite a vinyl record sleeve. |
|
|
5 in the post to the first person to decode this message: |
|
|
Morgan, P. Oxford libraries outside the Bodleian. Oxford: Oxford Bibliographical Society, 1974, p.89
Buchan, J. The thirty-nine steps. London: Longman, Green & co. (the Heritage of Literature series), 1947, p.105
Abbadie et al, Museum Manifesto: What future without nature? Paris: Editions Museum National d'Histoire Natruelle, 2017, p.76
Montaigne, Essays (trans. J. Florio, intro C Whibley). London: Blackie & son Ltd., no date, p.245
Lyons, L. A practical guide to data analysis for physical science students. Cambridge: Cambridge University Press, 1991, p.88
Mrs Beeton's Cookery and Household Management. London: Ward Lock Ltd, 1960, p.379 |
|
|
I fear this is not a very practical idea. |
|
|
Wikipedia lists Turkey as sharing nuclear weapons provided by the U.S. This is an intensely bad idea. These nuclear weapons are allegedly kept secure remotely by a "Permissive Action Link (PAL)" which is "almost impossible to bypass" |
|
|
Really, has anyone created encryption which can't be broken, given enough time? |
|
|
Those weapons should not be in Turkey. They should not be in Germany. |
|
|
No, they should be dropping out of the sky further to the south-east at this very moment ... |
|
|
It's an interesting question: would Turkey or any other country really nuke their own border? |
|
|
Yes, if the wind's blowing in the right direction. A low yield airburst will do a lot of damage but dump relatively little contamination in the immediate area. The USSR proved out the use of tac-nukes this way in the 1960's and it was part of NATO's strategic posture during the Cold War if the Ivans ever trundled into Germany .... |
|
|
//can't be broken, given enough time// |
|
|
I believe a "one-time pad" is considered unbreakable, but has practical limitations. [link] |
|
|
So you are suggesting that every book, once cited, has to be burned? |
|
|
Start with the Barbara Cartlands then, plenty to go at ... then the Mills & Boon ... |
|
|
There's still a 5 reward sitting here for a correct decryption |
|
|
After Brexit it will be replaced with £5 |
|
|
In that case, patience seems the best policy, as £5 is already worth more than 5, and will be worth even more after Brexit. |
|
| |