Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
7Activity
0 of .
Results for:
No results containing your search query
P. 1
al-Qaeda's Cypher Manual

al-Qaeda's Cypher Manual

Ratings: (0)|Views: 907|Likes:
Published by Rob
The portion of the Encyclopedia of Jihad dealing with encryption.
The portion of the Encyclopedia of Jihad dealing with encryption.

More info:

Published by: Rob on Apr 18, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/19/2013

pdf

text

original

 
Freedom
ofInformationAct/Privacy
Act
Deleted
Page(s)
Information
Sheet
Indicated
below
are
one
ormore
statements
which
provide
a
brief
rationale
for
the
deletion
of
this
page.
X
Information
has
been
withheldin
itsentirety
in
accordance
with
the
following
exemption(s):
s
usc
552
(bx2)
It
is
not
reasonable
to
segregate
meaningfulportionsof
the
record
for
release.
Information
pertainssolely
to
another
individual
with
no
reference
to
you
andlor the subject
of
your
request.
Information
originated
with
another
government
agency.
It
has
been
referred
to
them
for review
and
direct
response
to
you.
I
Information
originated
with
one
ormoregovernmentagencies. We
are
coordinating to
determine
the
releasability
of
the
information
under
their
purview.
Uponcompletion
of
ourcoordination,
wo
will
advise
you
of
their
decision.
DELETED
PAGE(S)
NO
DUPLICATIONFEE
FOR
THIS
PAGE.
IAGPA-CSF Form
6-R
1
Sep
93
Page(s)
I-2
 
UNCLASSTFIED
NGIC-2003-00174-HT
Encyclopedia of Jihad,
Security
andIntelligence
Volume,
(pp.
1049-1059)t
SECRET
WRITING:
Included
in
the science
of
secret
commrmication
is the
topic
secret
writins:
writing
by
use
of
secret
ink
or
ciphers2.
kr this study
we
will
explain
the
meaning
of
enciphering,
andsomeother
terms that
are
connected to the
topic.
Ciphersis
the
operationof replacinglettersor
numbers
in
such
a
way thatthey
are
replaced
with
otherlettelsthat
are
not
the
originals,with
the
intention of
concealing,camouflaging,
and
hiding
the
real
mer.:ring.
This
is
agreed
upon
by
all
of
the sides
that
are
concemed
with
this
enciphering,
and
especially
betwee,n
the branches
of
headquarters.
Enciphering3:
Transforming
the
plaintextinto
secret
writing.
Al-Code
(theCode)
or
The
Secret Messaee:
-This is
a
group
of
letters orwords thatrepresent
otler
words
or
topics. Forexample,
I
say,
"I
am
starting
a
business," Themeaning
of
this
phrase
is,
with
rcspect
to
the
otherpatties,
"I
am
declaring
JITIAD;
and
I
am
starting
it."
Wtitinewith
Ciohers:The
art
of
se,nding
messages
in
a
method that conceals its truemeaning
from
everyone
butitsrecipient.Theprocedureof
writing
by
means
of
ciphers, symbols,
and
riddles
and
delivery
is
composed
of
a
number of
basicelements
(numerous
aspects and standards).
1
-
sender
2
-
rcceiver
3
-
enciphereda message
I
Thedocument
appearc
to be
an
imprecisetrauslafionfronr
a
second language
into
Arabic.
Underscorirrg
and
arrolvs
havebeenadded
to this
document
to
facilitate
itsreading.
t
The
Arabic
nornshfrah
[:IFR?in
SATTS]
isequallytranslated into the
terms
"ciphers"
or
"enciphering"
based
on
its use in
the
original
document.
3
Thc verbal
noun
tasffrft:FlR]
could
bE
translated
"encrypting"
or
"encoding"
but
is
gencrallyransiated
"enciphering"
forthe
sake
ofconsistency.
o
J
UNICLASSIFTEI)
 
1-
UNCLASSIFIED
NGIC-2003-00174-HT
4
-
a
common
systemon the basis
ofwhich
it
operatesand
the securityrules
adhered to
by our security
sources.
5
-
a
secure means
of h'ansrritting.
These
elements
are
strongly
linked
together.
But
if
one
element
fails
in
its
task
theu
tireentire operation
(of
secret
communications)
tails.
On
one hand,
the
information spills
out.
Onthe other, the
information
is cut
offfrom
the
other
party.For
a
fwther
explanation
see
Figtne
l,
which
shows
the elements'
association
with
respect
to
each
other.The
bestmeans
of
conveying
information
isto oombine
it
rvith
obvious meanings
so
the
one
who
comes across
it
does
not
understand
it.
Secret
writing,
also
named
the
science
of
concealment,
encompasses
two
methods:
Ciphers
andCodes:
In the
system
of
ciphers
the
messages
change
according
to fixed
formulasthat make solvingthern
difficult,
except
for
those
who
know
the formulas.The
systern
of
codes
uses
a
series
of
codesand
wordsthat
represent the
words
of
the
text in
such
a
way
that
understanding the
message
becomes
impossible
without
beingacquainted
with
the codebook
andits
table.
Now,how
do
we
learn
the
steps
of
enciphering
a
message,and
what
are
the steps?
The
answer:
There
are
important rulesthat must
be
known
first
in
writing
oiphers.
There
is
a
thing
in
theenciphered
message
called the
solution key:
-
This
is
a
number
or a
code
that
is
agreed
upon
in
advance
and
is
found
in
the
enciphered
message.
Naturally,
this
is
to
increase
the
complexity
of
theenciphered
message.
It
can
be
said
that the
enciphered
message
relies on
a
number
of
factors
in
order
to
increase
the
complexity:
(1)
a
solution
key
and
4
Tlre
past
particrple
mush{far
[M:FR]
can also be
tanslated
as
"encrypted"or"encoded."
See
footuote
3.
4
Ui\CLASSIFIED

Activity (7)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
takashiro liked this
takashiro liked this
takashiro liked this
cetinyilgor liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->