Street Cryptography
4.5/5
()
About this ebook
So, you have a conspiracy going and need to pass messages along without worrying that someone will intercept them. Congratulations, you've stumbled across the right book. Whether your personal solution is a Vigenere, a Vic, or a One Time Pad, you'll find an easy guide on creating your own encryption scheme right here. No need for a computer, except for the device you're reading this on. This can all be done in your favorite notebook, with a PENCIL!
Christopher Forrest
Christpher Forrest lives in New York City with his wife and six children. He was a one-time student of mathematics. He has worked every menial job you could imagine, including security, before becoming an EMT. After, he earned his Commercial Driver's License and worked as a trucker. He is a hobbyist cryptologist, redditor, slacker(Slackware Linux) and contributes to SlackBuilds.org(a site for 3rd party Slackware packages.) Occasionally, he'll even play music(country, of course). He is a native of Arkansas.
Related to Street Cryptography
Related ebooks
Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cryptanalysis: A Study of Ciphers and Their Solution Rating: 4 out of 5 stars4/5Codes and Ciphers Rating: 5 out of 5 stars5/5The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption Rating: 0 out of 5 stars0 ratingsCodes, Ciphers and Secret Writing Rating: 4 out of 5 stars4/5Codes: How to Make Them and Break Them! Rating: 4 out of 5 stars4/5Bletchley Park Codebreaking Puzzles Rating: 0 out of 5 stars0 ratingsCracking Codes and Cryptograms For Dummies Rating: 3 out of 5 stars3/5Secret and Urgent - The Story of Codes and Ciphers Rating: 0 out of 5 stars0 ratingsBecoming an Ethical Hacker Rating: 4 out of 5 stars4/5Cryptography for Developers Rating: 3 out of 5 stars3/5Dissecting the Hack: The F0rb1dd3n Network, Revised Edition: The F0rb1dd3n Network Rating: 4 out of 5 stars4/5The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet Rating: 4 out of 5 stars4/5Hacked Again Rating: 5 out of 5 stars5/5Low Tech Hacking: Street Smarts for Security Professionals Rating: 4 out of 5 stars4/5Understanding Network Hacks: Attack and Defense with Python Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Ultimate Hacking Challenge: Hacking the Planet, #3 Rating: 5 out of 5 stars5/5Advanced Penetration Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsBlackhatonomics: An Inside Look at the Economics of Cybercrime Rating: 3 out of 5 stars3/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Applied Network Security Monitoring: Collection, Detection, and Analysis Rating: 3 out of 5 stars3/5Learning Linux Binary Analysis Rating: 4 out of 5 stars4/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5
Reviews for Street Cryptography
3 ratings1 review
- Rating: 4 out of 5 stars4/5Overall it was a great and quick introduction to basic ciphers. Author did a good job weaving humor into the subject which made it more readable than a lot of other books on the subject. The only issue I had was it felt like the chapter on combining different types of ciphers was glossed over and could have used some elaboration on how the strengths of certain ciphers make up for the weaknesses of others when used together.
Book preview
Street Cryptography - Christopher Forrest
STREET CRYPTOGRAPHY
A Quick and Dirty Way to Maintain Your Secret Conspiracy
By Christopher Forrest
Copyright 2012 Christopher Forrest
Smashwords Edition
Smashwords Edition, License Notes
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author.
Permission is also granted for the owner of this purchased or gifted copy to print one(1) copy of this ebook for one's personal use. For further permissions, please contact the author.
Table of Contents
Introduction
Part I: Subsitution Ciphers
Chapter 1: The Caesar Cipher
Chapter 2: The Polybius Square
Chapter 3: Just For Fun
Chapter 4: Vigenere Cipher
Chapter 5: Straddling Checkerboard
Part II: Transposition Ciphers
Chapter 6: Historic Transposition Ciphers
Chapter 7: Columnar Transposition
Part III: Securing a Cipher
Chapter 8: Random Number Generation
Chapter 9: Super Encryption
Chapter 10: One Time Pad
Final Thoughts
Appendix
Appendix A: Solutions to Encryptions
Appendix B: Vic Cipher
Appendix C: Checkerboard Variations
INTRODUCTION
Ok, you have a conspiracy going. You have secret goals and operations going out in all directions. At first, you met face to face with all members of your group, and that worked. Things have changed. You now need a way to secretly deliver a message to someone you won't meet on a regular basis. Congratulations, you picked up the right book.
Before I show you a good way to put together your cipher, I'm going to bore you with the details of why you don't want to use certain other ciphers.
Back to Top
PART I
SUBSTITUTION CIPHERS
Back to Top
Chapter 1
The Caesar Cipher
This is, historically, the oldest cipher known to modern man. Its age alone should tell you that it has been beaten, to death, repeatedly. You can even check the New York Times puzzle section to see examples given to be cracked as a game. Long story short, DON'T USE IT.
Now that I've gotten that out of the way, how about we take a look at what the Caesar Cipher actually is?
Julius Caesar was a renowned general, and he needed to get secrets across to his