Space Pirate Science

NUMBERS STATIONS

0096 2251 2110 8105


Since World War II Intelligence agencies have used secret stations to send encrypted assignments to agents in the field.

Unlike digital and cellular communications, these shortwave broadcasts of encoded numbers are untraceable.

Governments deny the use of these so called Numbers Stations yet they can still be heard today.

Google the term Numbers Station and search for them on youtube. They do exist and you can actually listen to them on the radio even now.

This is essentially a way for anyone who is interested, to implement Numbers Stations into their campaign. Feel free to use, copy, and modify if needed.

TOP SECRET CRYPTO 5 SCI EYES ONLY
Cipher Cat Operations
Telecomix Crypto Munitions Bureau
Erebus Network

The Telecomix Crypto Munitions Bureau under the order of Cipher Cat has deployed the Erebus Project. The Erebus Project is a series of covert Numbers Stations that are scattered across the land in a complex network of terminals utilizing the highly classified TCMB CYPHER Crypto System.

This network of covert shortwave radio stations is connected to a central network of closed loop Erebus Network Lines that cannot be tapped into and are totally hack proof and magically shielded. But they also have satellite comm lines too as a back up. These secure lines are used to send the messages to be broadcasted out to each station. They are also used to send the random seed values generated by the Cryptographically Secure Pseudo Random Number Generator (CSPRNG) in each terminal in the event of a Cypher Compromise. These lines are encrypted with a special Crypto System called Cyber Saber.

This open source tiny algorithm is able to be forged into your own personal crypto algorithm. Darken Rahl forged the Cyber Saber that is used in the Erebus Lines. He wrote a special One-Time Pad based Stream Cipher that uses special One-Time Key Files consisting of random binary data generated with a processor that has dual Quantum Random Number Generators (QRNGs) built into the die itself. QRNGs use the unpredictability of photons to generate truly random sequences of numbers. These are not Pseudo-Random in anyway.

These Key Files are used encrypt and decrypt the messages sent across the lines. After a message or seed value is sent to a station, the Key Files are securely erased and changed automatically by the system. The Key Files themselves are stored in tamper proof secured cryptographic modules and cannot be accessed by the users or any unauthorized hardware and software. There are Anti-Magic Components in these chips which will vaporize them if they come in contact with any form of magical energy. The Key Files will self destruct if the chip is tampered with in anyway.

Each Station uses the One-Time Pad in order to remain perfectly secure. Unlike the QRNGs used to generate the Key Files, the CYPHER Crypto System uses CSPRNGs to generate the Cyphers. However, the random seed vales used to feed the CSPRNGs do use QRNGs to ensure that the seed values are unpredictable. These seed values are then sent via the Erebus Lines to all the other stations to ensure that we don’t have to issue pads unique to each station.

The Original CYPHER Crypto System was cracked on Middle Earth due to a Zero Day Exploit that we had no idea even existed. The Erebus Lines were not compromised themselves.

Each Cypher has a unique identifier called the Key Fingerprint. This identifies exactly what the Cypher File is in use. It is generated by encrypting the Random Seed Value and then sending it across the Erebus Lines as a Ciphered Message Authentication Code (CMAC). It used a special Block Cipher called the Telecomix Encryption Standard (TES) however it was operating in Electronic Code Book (ECB) Mode. This is a very insecure mode and not to mention it used 128 bit keys which is not really secure now a days. Because of this weak encryption scheme it was possible to extract the Random Seed from the Key Fingerprint. Once you have the Seed you can create an exact clone of the Cypher File. Also the CSPRNG was compromised too due to it being a software based RNG.

An example of this is shown below.

Key Fingerprint: 0×1D078D43544145770D2FF055F1D6598A3761D972
CSPRNG Value: 0xF2BE1FC7B6EF1463057C0CB658AF88CC

As a result we updated the CYPHER Crypto System to include two other input values. But first we changed the system to use the terminal’s built in Dual QRNGs to generate the Random Seed Value and use that Seed to create an Initialization Vector (IV) for the new TCMB Polymorphic Mutating Block Cipher which is a fork of the Digital Fortress Polymorphic Mutating Encryption Algorithm. This is a cipher that operates on Cipher Block Chaining (CBC) Mode by default. This one uses a Polymorphic Engine with a QRNG to enhance the Rotating Cleartext Function. Then the operator enters a User Defined Key to further scramble the Random Seed Value and the IV. Finally all of this is used to generate the Key Fingerprint.

An example of the new system is shown below.

Key Fingerprint: 0×371B62A0CBB78CBACE936E0D5674E550C517ED5E
QRNG Value: 0×86937C774E6C11874008DE6C784B9BF0
IV: 0×85D6E58A46C3ED59F2B7F9A39865A618
User Defined Key: 0×7438DA33EBE97E9782299FAC29D6DC22

Each terminal uses the Telecomix Cipher Operating System with the Marutukku Cryptographically Secure and Deniable File System. To ensure that the keys are not compromised, the Marutukku File System has been modified to become a RAM File System. If the station is compromised and the power is cut off or the computers are damaged, the files are wiped from the system because of the fact that RAM is wiped every time the computer is powered off.

To begin a broadcast, first you input a series of randomly assigned numbers that are converted into HEX values to begin the initialization process of the Cypher. This will determine the values for a iteration of the Cypher. There are multiple iterations for each Cypher File. The core of this system lie in a series of blocks. Cypher Blocks and Key Blocks. For each Cypher Block there are 5 Key Blocks. In total there are 8 Cypher Blocks and 40 Key Blocks.

One the IV values are entered they are XOR’d with the pre determined QRNG values in the Cypher Blocks. The Cypher Blocks are in charge of the distribution of the values for the Key Blocks. Each Cypher block based on the current QRNG seed built in then uses a CSPRNG to distribute the keys to each Key Block. This function is used to obfuscate the distribution of the keys to ensure that no pattern appears.

Once this is done then you have your Cypher mostly completed. Now you can broadcast the numbers and the computer will handle the permutations of the Key Blocks as you broadcast the message. You will have enter the sub key values after each group is sent.

The Cypher File can be securely downloaded and saved to an external device although is not recommended that you do this as you risk the file being compromised. If you have to save the file to another system then you should save it to a secured cryptographic device that has no network interfaces wired or wireless. One such device would be the ultra secure Iron Key USB flash drive with a built in secured secure cryptographic module and a tamper proof design. You will have to perform the permutations manually if the Cypher File is on an external device but before you can do that, you must load the Cypher File into the station terminal.

The reason you must perform the permutations manually is because of the fact that when the Cypher File is downloaded, the CYPHER Software will automatically alter the Cypher’s Hash Checksum with a flag that indicates the file was downloaded and thus possibly compromised. If this flag is detected by the computer then the distribution of the Key Blocks from the Cypher Blocks will come directly from the QRNG instead of the CSPRNG. So you will have to calculate the permutations manually.

They are all set up and will start broadcasting encrypted messages by the end of the month. Each person who is a Field Agent will be issued a One-Time Pad to decrypt the messages.

Officially these stations do not exist.

End of line

Comments

The_WAR10CK

I'm sorry, but we no longer support this web browser. Please upgrade your browser or install Chrome or Firefox to enjoy the full functionality of this site.