1995-12-11 - Re: The Elevator Problem

Header Data

From: Daniel Miskell <DMiskell@envirolink.org>
To: s1113645@tesla.cc.uottawa.ca
Message Hash: 08de5b639870cc07199f556d016fef67701c20a8ac8d439b07bccdd754453316
Message ID: <9512111557.AA09207@envirolink.org>
Reply To: N/A
UTC Datetime: 1995-12-11 20:41:18 UTC
Raw Date: Tue, 12 Dec 1995 04:41:18 +0800

Raw message

From: Daniel Miskell <DMiskell@envirolink.org>
Date: Tue, 12 Dec 1995 04:41:18 +0800
To: s1113645@tesla.cc.uottawa.ca
Subject: Re: The Elevator Problem
Message-ID: <9512111557.AA09207@envirolink.org>
MIME-Version: 1.0
Content-Type: text/plain


Ok, here was the method of key generation i was talking about.  With the light 
communications, the idea was to use photons whose waves pulsed in certain 
directions (up/down, left/right, and diagonally) to create a way toommunicate 
much like morse code.  The key used to scramble these communications was 
designed to change the direction the photons of a message pulsated - like 
changing the characters of a message, scrambling it up.  The key consisted of 
three symbols, one for each of the possible orientations, and was fainly 
simple. It was like a one time pad in that the key was never recycled.

The key could be generated by a game of 20 questions, so to speak.  The people 
at either end randomly generated a key.  Then, they asked eiither indirect 
questions about the contents of one anothers key (do you have an odd number of 
up/down symbols in row x, etc), but since the contents of the key were never 
touched on DIRECTLY, no eavesdfropper could determine the key, and it was 
ttally secure.

We, obviously, cannot use the photon as a method of communication, not for th 
e masses.  the undertaking of building such a network from scratch is 
astronomical.  however, if one wwas to use the orientation symbols in ones 
messages, as if they were being beamed, but in an email message instead, one 
could make use of the simple key, and the simple game of '20 questions' to 
generate a totally secure key in a mater of minutes, depending on how long the 
message was and therefore how long the key has to be.  Does any of this make 
sense?

Regards, 
Munster.
---
_________________________________
*!Cheese Doctrine:!*
    Though cultured over time,
and aged to perfection, one must
not yield to produce mold.  One
must also not belittle themselves
by conforming to the "whiz", but
melt over the unprocessed ideas
of Ghuda.
_________________________________







Thread