HOME

TheInfoList



OR:

''The Radio Hacker's Codebook'' is a book for computer enthusiasts written by
George Sassoon George Thornycroft Sassoon (30 October 1936 – 8 March 2006) was a British scientist, electronic engineer, linguist, translator and author. Early life Sassoon was the only child of the poet Siegfried Sassoon and Hester Sassoon (née Gatty), and ...
. The book explains how to receive international
radioteletype Radioteletype (RTTY) is a telecommunications system consisting originally of two or more electromechanical teleprinters in different locations connected by radio rather than a wired link. Radioteletype evolved from earlier landline teleprinter o ...
signals, convert them with a circuit and then decode them on a microcomputer. In the case of this book the computer is the superseded
Research Machines 380Z The Research Machines 380Z (often called the RML 380Z or RM 380Z) was an early 8-bit microcomputer produced by Research Machines in Oxford, England, from 1977 to 1985. Description The 380Z used a Z80 microprocessor (hence the name) with up to 56&n ...
. Programs to do these functions are given, written in machine code and
BASIC BASIC (Beginners' All-purpose Symbolic Instruction Code) is a family of general-purpose, high-level programming languages designed for ease of use. The original version was created by John G. Kemeny and Thomas E. Kurtz at Dartmouth College ...
. However legal and moral issues relating to intercepting messages are not included. Other radioteletype subject included are the FEC and
automatic repeat request Automatic repeat request (ARQ), also known as automatic repeat query, is an error-control method for data transmission that uses acknowledgements (messages sent by the receiver indicating that it has correctly received a packet) and timeouts ...
used in maritime radiocommunications. The book also include an exposition of encryption, including the public key RSA cipher and presciently expounds on the lack of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
in the
cashless society In a cashless society, financial transactions are not conducted with physical banknotes or coins, but instead with digital information (usually an electronic representation of money). Cashless societies have existed from the time when human soc ...
. Code examples are also given using the Sharp PC-320I to encode and decode the German Enigma machine. The books claims that the Enigma was kept secret for long periods because understanding it could compromise the American
M-209 In cryptography, the M-209, designated CSP-1500 by the United States Navy (C-38 by the manufacturer) is a portable, mechanical cipher machine used by the US military primarily in World War II, though it remained in active use through the Korean W ...
cipher machine, and that it was still being sold to other countries. Other encryption topics covered include
Data Encryption Standard The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cry ...
,
Vernam cipher Vernam is a surname. Notable people with the surname include: *Charles Vernam (born 1996), English professional footballer *Gilbert Vernam (1890–1960), invented an additive polyalphabetic stream cipher and later co-invented an automated one-time ...
(
one-time pad In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is not smaller than the message being sent. In this technique, a plaintext is paired with a ran ...
),
pseudo random number generator A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), is an algorithm for generating a sequence of numbers whose properties approximate the properties of sequences of random numbers. The PRNG-generate ...
s,
transposition cipher In cryptography, a transposition cipher is a method of encryption which scrambles the positions of characters (''transposition'') without changing the characters themselves. Transposition ciphers reorder units of plaintext (typically characters or ...
s, and
substitution cipher In cryptography, a substitution cipher is a method of encrypting in which units of plaintext are replaced with the ciphertext, in a defined manner, with the help of a key; the "units" may be single letters (the most common), pairs of letters, trip ...
s ''The Radio Hacker's Codebook'' is idiosyncratic revealing a personal quest by Sassoon to decrypt military signals on the radio spectrum. However he would have had no chance to decode modern encryption as described in the book. ''The Radio Hacker's Codebook'' broke ground in having a low price for a technical computing book being sold for £6.95 well below the typical £10+ price for computing books at the time.{{cite journal, last=Harwood, first=David, date=May 1986, title=Read Only, journal=ZX Computing Monthly, page=48, url=http://www.worldofspectrum.org/showmag.cgi?mag=ZXComputing/Issue8605/Pages/ZXComputing860500048.jpg It was published by
Duckworth Duckworth may refer to: * Duckworth (surname), people with the surname ''Duckworth'' * Duckworth (''DuckTales''), fictional butler from the television series ''DuckTales'' * Duckworth Books, a British publishing house * , a frigate * Duckworth, W ...
and had 239 pages.


References

Cryptanalytic software