TUTORIALS AND EXAMPLES ON DECRYPTING
Decrypt menu
How to simple decrypt any file ?
The browser used in all these computations is IE 6.0. If you use other browsers OR or a different version of the same browser, it doesn't work. The Operating System used, is not so important as far as the program can be executed. The partners at the two sides should have exactly the same kind of browsers in order to synchronize to each other. To make synchronization, the contributing partners should perform the following checks and alignments on their browsers:
A -Control: Help > About Internet Explorer > read the version number. If it is NOT 6.0, then don't commence.
B -Align: Tools > Internet Options > Advanced > Restore Defaults > Apply > OK.
C -Align: View > Encoding > check "Western European (ISO)". ("Auto Select" option should be UNchecked)
Use the "Western European (ISO)" option during all the savings, and state this condition on all of the tables.
The receiver would retrieve the keyfiles by some internet surfing to some sites (ON A DIFFERENT MACHINE), which has been prearranged by the agreement of two sides in advance. The browser used at this stage should also be the same as the one which is used in encryption and additional synchronization should be made as defined above
NEVER do the keyfile browsing/surfing by the same machine which the practical(OTP) software is installed. If you are working in an official building it is very probable that every surfing movement is tracked by your adversaries. The keyset, which is browsed at an unsuspected machine will be saved on floppy disks, then brought to the computer where the OTP program is installed.
Download & unzip Encrypt 54321.zip and save all the keys into (C:\windows\desktop\message 54321) |
internal security number ISN: 19453208 |
name of file for saving |
file web address(click to open ) |
Viewing and Encoding during saving |
Saving type of file |
key1(54321).txt |
site1 |
Western European (ISO) |
Text File (*.txt) |
key2(54321).txt |
site2 |
Western European (ISO) |
Text File (*.txt) |
key3(54321).txt |
site3 |
Western European (ISO) |
Text File (*.txt) |
key4(54321).txt |
site4 |
Western European (ISO) |
Text File (*.txt) |
How to save keys: Click to site1 or site2 or site3 or site4; then from file menu at top left, choose save as; complete the Save Web Page prompt as shown in the tables, to the directories stated at the first cell of their tables.
The usage of keys and encrypted files for decryption are described at the end of this section.
At this stage, encrypt may be easily cracked by the code crackers of IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education (should actually select different language texts for different keys in a keyset), If you are looking for a real tough pad and try your skills, you have to perform double encrypting.
Download & unzip Encrypt 00654.zip and save all the keys into (C:\windows\desktop\message 00654) |
internal security number ISN: 19453208 |
name of file for saving |
file web address(click to open ) |
Viewing and Encoding during saving |
Saving type of file |
key1(00654).txt | site1 |
Western European (ISO) |
Text File (*.txt) |
key2(00654).txt | site2 | Western European (ISO) | Text File (*.txt) |
key3(00654).txt | site3 | Western European (ISO) | Text File (*.txt) |
key4(00654).txt | site4 | Western European (ISO) | Text File (*.txt) |
How to save keys: Click to site1 or site2 or site3 or site4; then from file menu at top left, choose save as; complete the Save Web Page prompt as shown in the tables, to the directories stated at the first cell of their tables.
The usage of keys and encrypted files for decryption are described at the end of this section.
At this stage, encrypt may be easily cracked by the code crackers of IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education (should actually select different language texts for different keys in a keyset). If you are looking for a real tough pad and try your skills, you have to perform double encrypting.
Download & unzip Encrypt 45334.zip and save all the keys into (C:\windows\desktop\message 45334). |
internal security number ISN: 19453208 |
name of file for saving |
file web address(click to open ) |
Viewing and Encoding during saving |
Saving type of file |
key1(45334).txt | site1 |
Western European (ISO) |
Text File (*.txt) |
key2(45334).txt | site2 | Western European (ISO) | Text File (*.txt) |
key3(45334).txt | site3 | Western European (ISO) | Text File (*.txt) |
key4(45334).txt | site4 | Western European (ISO) | Text File (*.txt) |
How to save keys: Click to site1 or site2 or site3 or site4; then from file menu at top left, choose save as; complete the Save Web Page prompt as shown in the tables, to the directories stated at the first cell of their tables.
The usage of keys and encrypted files for decryption are described at the end of this section.
At this stage, encrypt may be easily cracked by the code crackers of IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education (should actually select different language texts for different keys in a keyset). If you are looking for a real tough pad and try your skills, you have to perform double encrypting.
Download & unzip Encrypt 00034.zip and save all the keys into (C:\windows\desktop\message 00034) |
internal security number ISN: 19453208 |
name of file for saving |
file web address(click to open ) |
Viewing and Encoding during saving |
Saving type of file |
key1(00034).txt | site1 |
Western European (ISO) |
Text File (*.txt) |
key2(00034).txt | site2 | Western European (ISO) | Text File (*.txt) |
key3(00034).txt | site3 | Western European (ISO) | Text File (*.txt) |
key4(00034).txt | site4 | Western European (ISO) | Text File (*.txt) |
How to save keys: Click to site1 or site2 or site3 or site4; then from file menu at top left, choose save as; complete the Save Web Page prompt as shown in the tables, to the directories stated at the first cell of their tables.
The usage of keys and encrypted files for decryption are described at the end of this section.
At this stage, encrypt may be easily cracked by the code crackers of IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education (should actually select different language texts for different keys in a keyset). If you are looking for a real tough pad and try your skills, you have to perform double encrypting.
Download & unzip Encrypt 12345.zip and save all the keys into (C:\windows\desktop\message 12345) |
internal security number ISN: 19453208 |
name of file for saving |
file web address(click to open ) |
Viewing and Encoding during saving |
Saving type of file |
key1(12345).txt | site1 |
Western European (ISO) |
Text File (*.txt) |
key2(12345).txt | site2 | Western European (ISO) | Text File (*.txt) |
key3(12345).txt | site3 | Western European (ISO) | Text File (*.txt) |
key4(12345).txt | site4 | Western European (ISO) | Text File (*.txt) |
How to save keys: Click to site1 or site2 or site3 or site4; then from file menu at top left, choose save as; complete the Save Web Page prompt as shown in the tables, to the directories stated at the first cell of their tables.
The usage of keys and encrypted files for decryption are described at the end of this section.
At this stage, encrypt may be easily cracked by the code crackers of IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education (should actually select different language texts for different keys in a keyset). If you are looking for a real tough pad and try your skills, you have to perform double encrypting.
Download & unzip Encrypt 70001.zip and save all the keys into (C:\windows\desktop\message 70001) |
internal security number ISN: 19453208 |
name of file for saving |
file web address(click to open ) |
Viewing and Encoding during saving |
Saving type of file |
key1(70001).txt | site1 |
Western European (ISO) |
Text File (*.txt) |
key2(70001).txt | site2 | Western European (ISO) | Text File (*.txt) |
key3(70001).txt | site3 | Western European (ISO) | Text File (*.txt) |
key4(70001).txt | site4 | Western European (ISO) | Text File (*.txt) |
How to save keys: Click to site1 or site2 or site3 or site4; then from file menu at top left, choose save as; complete the Save Web Page prompt as shown in the tables, to the directories stated at the first cell of their tables.
The usage of keys and encrypted files for decryption are described at the end of this section.
At this stage, encrypt may be easily cracked by the code crackers of IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education (should actually select different language texts for different keys in a keyset). If you are looking for a real tough pad and try your skills, you have to perform double encrypting.
Download & unzip Encrypt 70005.zip and save all the keys into (C:\windows\desktop\message 70005) |
internal security number ISN: 19453208 |
name of file for saving |
file web address(click to open ) |
Viewing and Encoding during saving |
Saving type of file |
key1(70005).txt | site1 |
Western European (ISO) |
Text File (*.txt) |
key2(70005).txt | site2 | Western European (ISO) | Text File (*.txt) |
key3(70005).txt | site3 | Western European (ISO) | Text File (*.txt) |
key4(70005).txt | site4 | Western European (ISO) | Text File (*.txt) |
How to save keys: Click to site1 or site2 or site3 or site4; then from file menu at top left, choose save as; complete the Save Web Page prompt as shown in the tables, to the directories stated at the first cell of their tables.
The usage of keys and encrypted files for decryption are described at the end of this section.
At this stage, encrypt may be easily cracked by the code crackers of IA's (unless plaintext is very short), all pads carry some negligible latent patterns coming from the keys, and the code crackers don't even have to download the key sets. It is enough to make a cryptanalysis on encrypted text. Because the encrypted texts are NOT too short, but quite long to make cryptanalysis on them. These examples are only given for tutorial and education (should actually select different language texts for different keys in a keyset). If you are looking for a real tough pad and try your skills, you have to perform double encrypting.
Attention Double encrypted !
Download (top secret).zip *Top Secret message in English |
Question: What's the plaintext ? |
The contents of this file is about an unbelievable and shocking truth about some very important occurrence which had happened in 3rd. millennium, (Hope you can guess the subject !). If you fail to crack the code now; then what will you do in the future, if some illegal groups use this system to communicate with each other?.
Sooner or later somebody should arrange an attack on this system. Nobody has the right to act as nothing has happened, since we are not ostriches and cannot put our heads in the sand during a threat.
We know that there are potent code crackers in some Western Agencies and the number of the employed mathematicians reach to thousands, so we are quite sure that this kind of coding system will be cracked by some methods or else it may cause a great nuisance in the future.
If the method used in this type of encryption doesn't delight your taste, why not try cross encryption for your deeper satisfaction?. Divide into two groups and send each other cross encrypted files to crack each others code. We are quite sure, within a short period of time you will also find some method, to crack cross encrypted coding.
HOW TO SIMPLE DECRYPT ANY FILE ?
Suppose you have a "C:\windows\desktop\message 00034" directory. In this directory; according to the definitions and procedures told above, there should be the following files saved and downloaded,
key1(00034).txt
key2(00034).txt
key3(00034).txt
key4(00034).txt
Encrypt(00034).enc
Do the following step by step for decryption;
Open the PracticalOTP program by double clicking its icon on the desktop.
1_ Click Decrypt menu.
2_ Enter the eight digit Internal security number.
3_ Click key1.txt, pass to ,C:\windows\desktop\message 00034 double click key1(00034).txt to enter the related first key.
4_ Click key2.txt, double click key2(00034).txt to enter the related second key.
5_ Click key3.txt, double click key3(00034).txt to enter the related third key.
6_ Click key4.txt, double click key4(00034).txt to enter the related fourth key.
7_ Click compute main key button,
Some time will pass for computing the main key, the working time will depend on the size of the key1.txt, key2.txt, key3.txt and key4.txt
8_ Click Encrypt.enc button, a file prompt will be opened to choose encrypted file. Double click on Encrypted Encrypt (00034).enc file to load it into the program, this is the encrypted practicalOTP file which is transferred or downloaded through open channels.
9_ Click compute decrypt.txt button,
Some time will pass for computing the decrypt.txt file, the working time will depend on the size of the contributing files.
10_ Opened and readable decrypt.txt file will always be saved into the root directory C:\ automatically.
11_ Click Exit and exit the practicalOTP program.
12_ Immediately go to the root directory C:\ and by renaming function of windows, change the name of decrypt.txt to a new name; message (00034).txt. You should do this procedure in order NOT to lose the encrypted file since the encrypted file will always be saved into the root directory with the same name and if you neglect doing this renaming operation, next time the program operates, the old decrypted file will be replaced by the new decrypted file and the previous file will be lost.
Sometimes the lines of message (00034).txt may be untidy AND ugly in NOTEPAD, a single line may take more than 80 characters (or up to 250 or more). You may correct this situation as following:
Open the Microsoft Word program > from open menu at files of type section, click text files > choose message (00034).txt and load it > make the necessary formatting as you wish > save this file as Word Document in some directory.