How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

Don’t Trash the American Flag! How to Retire a U.S. Flag

On Location in Rochester NY, today I found a American Flag in the trash on my way home tonight and I saved it from disgrace and took it home for a proper retirement ceremony. As I was getting out of the car with Cathy and the baby to go inside for the night, a old lady said “that she had followed me home to ask what I was doing with the flag that she saw me take out of the trash?” Eve I said to Eve the above statement! Eve asked if I wanted two more Flags that she had rescued from the trash a few weeks earlier. She said that I was sent from God and that she was meant to meetup with me this day! She gave me the flags thanked me and said her name was Eve and that her father died in World War 2 her brother fought in Vietnam and that her sister was a nurse in the US Army.  She said she was proud to see me do this.  I felt her pain and saw it in her face I could see she felt like crying for her loss of her father and brother
This is what I could do to honer our Country and those who fought and died for us today! For the Grandfather I never met who came home so messed up with PTSD and never was the same man he did that for you and I. Now I’m thinking about doing a Proper Flag retirement ceremony on the 4th of July this summer! How strange is life! God is good!
 Retire a U.S. Flag
National Flag Foundation recommends the following as the proper ceremonies for retiring and destroying a worn Flag.
    • This ceremony should be conducted at a private, non-public location.
    • Only one Flag, representing all those to be destroyed, should be used in the ceremony.
    • Two color guards should be used at evening retreat, one for the Flag currently in use and a special color guard for the Flag to be permanently retired.
    • Just before sunset, the Flag that has been flying all day is retired in the normal, ceremonial procedure for the group or site.
    • The color guard responsible for the Flag receiving the final tribute moves front and center. The leader should present this color guard with the Flag that has been selected for its final tribute and subsequent destruction. The leader then should instruct the color guard to “hoist the colors”.
    • When the Flag has been secured at the top of the pole, the leader comments: “This Flag has served its nation long and well. It has worn to a condition to which it should no longer be used to represent the nation. This Flag represents all of the Flags collected and being retired from service today. We honor them all as we salute one Flag.”
    • The leader then calls the group to attention, orders a salute, leads the entire group in the “Pledge of Allegiance” and orders the Flag retired by the color guard.
    • Slowly and ceremoniously, the flag is lowered, then respectfully folded in the customary triangle. The Flag is delivered to the leader and then the group is dismissed.
    • This concludes the Ceremony of Final Tribute.
  1. 2

    Ceremonial Burning of the Flag

    • This ceremony should be conducted at a private, non-public location.
    • The burning of a Flag should take place at a campfire in a ceremony separate from the Ceremony of Final Tribute. The fire must be sizable (preferably having burnt down to a bed of red hot coals to avoid having bits of the Flag being carried off by a roaring fire), yet be of sufficient intensity to ensure complete burning.
    • Before the ceremony begins, the color guard assigned to the Flag opens up its tri-corner fold and then refolds it in a coffin-shaped rectangle.
    • All assemble around the fire. The leader calls the group to attention.
    • The color guard comes forward and places the Flag on the fire.
    • All briskly salute.
    • After the salute, but while still at attention, the leader should conduct a respectful educational program as the Flag burns: e.g. singing of “God Bless America”; offering an inspiring message of the Flag’s meaning followed by the “Pledge of Allegiance”; performing a reading about the Flag; reciting the “American’s Creed”; etc.
    • When the Flag is consumed, those assembled, with the exception of a leader and the color guard, should be dismissed. They should be led out in single file and in silence.
    • The leader and color guard should remain to ensure that the Flag is completely consumed, and to burn additional Flags, if any.
    • The fire should then be safely extinguished.

Create a website or blog at WordPress.com

Up ↑