ALICE needs to send a verifiable message to BOB but CAROL is trying to listen in.
CLEARTEXT - (should be obvious)
CIPHER - The system of encryption
CIPHERTEXT - the (hopefully not-understandable) gibberish generated
KEY - the arbitrary DECODING or ENCODING "thing/data/password-ish thing" - sometimes not both.
..when your attacker can potentially "see" everything.
EG, the internet, or even...
Security through obscurity* is generally a bad idea:
*The STRICT definition, meaning
"Relying on secrecy in implementation or design,
NOT in the key"
"Any person can invent a security system so clever that she or he can't think of how to break it."
Schneier's Law
(you can generalize this to a lot of things; e.g. Open Source, Auditing, etc)
(Or better yet, do, and throw it out. You'll learn something)
Sometimes people use this as an equivalent to Steganography, though not quite.
I.E the great
"Should you change your SSH Port" Debate?"
Against a determined attacker trying to get you personally? No point.
But, as the joke goes, it won't make you faster than the bear, but it will
make you faster than the other hunter.
One Way Strategies.
If you and your conspirator can "meet" - this makes things easy:
or better yet
(Note that OAuth 2FA is *a lot* like this, but not identical. The overriding 2FA code is like the "book")
Enter PUBLIC KEY ENCRYPTION
SIGNATURES
Pseudo-randomness is easy:
"Multiply big'ol numbers a bunch and chop off the beginning of them"
TRUE Randomness is surprisingly hard
In a sense, you can't do it "inside" the computer.
Yep, they're going to KEEP TRYING THIS MESS.
DON'T ROLL YOUR OWN...better yet
DEMAND only free and open source here, confirmed by e.g. NIST
Anything else is almost CERTAINLY compromised in real life.
All software is imperfect and may have bugs;
..watch out as they may try to use this against you.
Don't fall for the "Security through Obscurity" trap
(as in, actually reinforce, don't just hide)
- OR for the "Security through Obscurity trap" trap
(additional hiding to reinforcement isn't bad, aka someone might seriously say, DONT PAINT THIS CAMO.)
You'll have to do a fair bit of "game theoretical" thinking here,
when you're dealing with "black-box" encryption.
E.g. Whatsapp claims to be end-to-end encrypted?
I legit don't know.