This essay does not describe an existing computer program, just one that should exist. This essay is about a suggested student project in Java programming. This essay gives a rough overview of how it might work. I have no source, object, specifications, file layouts or anything else useful to implementing this project. Everything I have prepared to help you is right here.
This project outline is not like the artificial, tidy little problems you are spoon-fed in school, when all the facts you need are included, nothing extraneous is mentioned, the answer is fully specified, along with hints to nudge you toward a single expected canonical solution. This project is much more like the real world of messy problems where it is up to you to fully the define the end point, or a series of ever more difficult versions of this project and research the information yourself to solve them.
Everything I have to say to help you with this project is written below. I am not prepared to help you implement it; or give you any additional materials. I have too many other projects of my own.
Though I am a programmer by profession, I don’t do people’s homework for them. That just robs them of an education.
You have my full permission to implement this project in any way you please and to keep all the profits from your endeavour.
Please do not email me about this project without reading the disclaimer above.Uncrackable encryption for the masses. It works transparently with the email package. It uses CDs (Compact Discs) or DVDs (Digital Video Discs) distributed ahead of time to those communicating. CDs are recorded with truly random numbers generated by monitoring radioactive decay. pseudo random numbers are useless for this purpose.
It is a OTP (One Time Pad) system using a simple XOR (exclusive OR) of message and key, using a key equal in length to the message and never reusing a key. See the encrypt utility documentation for more detail on how the scheme works.
A more advanced version of the project requires to you build a peripheral that is a true random number source. Pseudo random number generators are useless for this purpose. Such a device would be useful for creating one-time pads and also in various simulations. Here are several ways it could work. See true random numbers in the Java glossary for more details on how to build on buy one.
Once you have this mechanism in place, you can build an uncrackably secure webphone. You use the standard Java microphone API (Application Programming Interface) to convert sound into numbers, compress them a little, encrypt the numbers and send them over the web in real time. On the other end you reverse the process and play the sound. You logically have two channels, one in each direction. Keep in mind that snoops can still place hidden microphones at either end, or snoop on EMF (Electro-Magnetic Fields) radiation from your computer. It is best to use a laptop which emits fewer clues. However, snoops can’t do anything simply by packet sniffing or intercepting and replacing packets. There is a slight delay as packets wend there way through the Internet, but not that different from a long distance call to Indonesia from Canada.
The advantages of this scheme are:
I have already implemented this, but for contractual reasons, I cannot release the source until 2014-02.
This page is posted
Optional Replicator mirror
Your face IP:[18.104.22.168]
You are visitor number|