kalen
Your Daddy
- Joined
- Mar 11, 2004
- Messages
- 933
It seems to me someone is always breaking the encrypted description for the contents of the remote viewing locker. I sent Mr. Randi the following, and it would be interesting to see what others had to say about it.
Dear Mr. Randi,
This week's commentary (Feb 2) mentioned that the encryption scheme used for the object in your Remote Viewing Locker had been broken. I am not sure if you changed the method by which you encrypted the plaintext, but looking at the ciphertext (only letters), it still appears like it could be a weak encryption.
I understand the need to give some sort of code that describes the contents of the locker, so there is no way for you to underhandedly change the contents if somebody "sees"/guesses correctly.
Here is a way that guanantees a strong encryption, and lets anyone who is interested check the result themselves, when the contents are finally revealed. It will ensure no cheating by any party.
There is a program widely available for most computers called md5sum. It takes a string of characters, or the contents of a file, and produces 128-bit checksum based on that input. Small changes in the input produce radically different checksums. Altering the input to produce the same checksum is basically impossible. Altering the input to produce the same checksum while the input is not gibberish is impossible.
Here's how it would work if I were to do this on my computer. It's a linux
machine, but it would work similar to windows.
First make a file, locker_contents.txt, say, and write the description of the item in the file (human brain, say). Then, run md5sum on the file. The output will look something like
53c292a2f55a81567b06e5972ad0590d
and this is what you would publish on your website. If you ever wanted to reveal the contents of the locker, then you would publish the original file locker_contents.txt. People could then even run md5sum on locker_contents.txt themselves to see if the published checksum matches.
The only way that is remotely practical to foil this scheme is to try alot of words, maybe using a dictionary, and hope that a match with the checksum occurs. With comupters nowadays, this would not take a really long time. But there is still a way!! Not only in locker_contents.txt do you put the description, but also a bit of goobledegook. eg. Instead of
human brain
write
hjhsd lskdjflskjdf lsdkjflksdjf sdlkfjslkdjallalk
jlksjdfjjfdk77865 HUMAN BRAIN 7884jlkdffhslldkjfs
sdfsd9)sdfjslkdf*ms.dkfkjajjslkdfjkdjfsllalkghs,p
Here, it is clear what is in the locker, but now the dictionary attack is no longer a threat. The checksum is still only 32 characters long no matter how big locker_contents.txt gets.
I hope this solves your encryption problems. I'd be more than happy to clarify anything I've written here. It's a neat idea. I'm not sure if checksums have been used in quite this way before, though it will work great.
As a demonstration, here is the checksum of a file that describes what is in *my* Remote Viewing Locker:
4920bf22bef0929cb42efef1c9f39244
Based on this alone, there is no way to find out. (If you really want to
know, find the locker_contents.txt file here:
http://hep.physics.utoronto.ca/~fmartens/locker_contents.txt
All the best,
Kalen
Last edited: