And here is the answer to my puzzle!
Supercode 1: Weakened!
1. Go to http://upsideout.com/
1a. Download graphic for Proxy.org
1b. Change File Extension from .gif to Null by deleting the file extension altogether.
1c. Open the Null file in MS Wordpad.
1d. Review open file - lots of junk characters - but here is the magic!
2. Examine the coded message. The 10's are meant to be a Trojan Horse for Binary guesses, but they are actually cumulative batches of 10.
2a. Add up the Batches of 10. The code letters are counted as # of characters from the top of the document. And this is the simple case!
2b. ^ is a deliberate re-use of a symbol, not to be the exponent of anything, but to mean "Approximately this many characters in". I have yet to formalize whether a character count is before or after the character, etc. Also, this covers for human errors. If I say "Approx 6 char in" and the first 8 are total junk and char 9 works, that's part of the theme, though that gets better with software.
2c. Once a character is located, the count starts back at zero. This should work for about any two uses of a letter here and there, because it sorta approximates 3-4 digit numbers per letter, so even if they get a stray L, that can't be that great of a help.
3. Take the next section of code from the beginning again. (In this variant! This was meant to be easy! Relative Counting via software is even better!)
3a. Count out the next batch of 10. Include the possibility that the author miscounted the batches! These are junk boxes, so if you come up way short, call me a moron, add an extra batch, then try again. Formalized again, this kind of thing will beat the Cracker programs because it's outside the algorithm (currently!).
3b. Find the second letter of the code.
4. Assemble the message.
4a. I only did two letters with a purposely easy method. I have almost 30 methods on tap. For example, relative counting, "destructive boxes" which change the letter countings of the data, I don't even have to use a single file, Unknown file locations, unknown data formats produce their own file-junk in Notepad, Trojan Horse Messages that are incorrect seemingly duplicate solutions, and more.
5. Publish the results. The Alpha test went to Justin Schlecter of UpsideOut.com and UpsideOut, Inc., DonationCoder.com, and an extra contact of my own. Method: If a both weakened and partially explained test example cannot be cracked in a trivial amount of time, then hardened versions combined with all the other methods should be a new set of security concepts.
6. Ideas: The power comes from blending multi-disciplinary ideas.
6a. Steganography is the art of including data that is at best meaningless, and even worse, misleads the cracker into a blind alley as a false hint.
6b. Multiplicity (as I term it) is the idea that it's not just a simple-but-tough algorothm; instead the cracker initially doesn't even know all of the techniques to use. So enemy time will be wasted trying to figure out even what methods to use, in what order.
6c. Obfuscation. Any of my internal results can be "wrapped" in a standard Crypto layer, so that even if a chunk of time and comps are used to break the outer layer, the message is still a mess. When modern cracking programs look for a pattern and the "correct answer at that level" is still
wergefrhrthjrewfgtrjreTGartheWHearygerHYareh, they might have trouble recognizing it as a valid key break. More research is needed here. Even if they do, the next step still takes a secondary algorithm, which could be "anything" as far as they know.
6d. Innovation - I believe there are tons of materials made possible by the Computer Revolution which will contribute to Cryptographic theory, but are not currently being harnessed. I have used a few of them in my sample.
6e. Left Field Thinking - My term for a new style of Cryptography. A quick glance over current literature on Cryptography seems to revolve on high end math. There is a lot of fertility left in low end PreProcessing and Post-Processing not covered by all this literature. Almost anything can be converted to cryptographic use, from spacial placement of desktop icons, to spaces in a document, to fonts used for punctuation per document per a chart. (Can you tell an Arial period from a Geneva period?)
6f. Test Cases. I have sent off a couple of purposely weakened test cases. If even the weak test cases prove troublesome, then the advanced algorithms and methods must be even worse!
7. There IS a mistake!!!!! (Not intentional, but recovering from it is part of this memo). I think a lot of my "10's" became straight "0's" in the last half. So I think restoring them to 10's works. I might have lost count, the receiver might need to add a 10. But it's still distractions, which serves my point. ((Partially fixed for DC, but there are still a couple of extra characters!))
There are more ideas not yet covered here in this memo.