DRYAD Pad Generator.
What is a DRYAD?
The DRYAD cipher is in essence a one-time pad or OTP used to encrypt numerical digits over radio communications by means of a polyalphabetic cipher, by using authentication, totally random seeds, and keeping the pads obsoleteness date short it can produce unbreakable cryptographic strength.
DRYAD tool
-
-
You have to generate the sheet before you can print it.
-
You have to generate the sheet before you can print it.
-
-
Description
A DRYAD cipher sheet (also called a pad or table) contains 25 lines or rows of scrambled letters.
In typical DRYAD pad each line is labeled by the letters A to Y in a column on the left of the page and each row contains a random permutation of the letters A through Y.
The letters in each row are grouped into 10 columns labeled 0 through 9. The column under 0 has 4 letters per row, column 1, 2 and 5 have 3 letters per row, the other columns have 2 letters each. Notably the letter I and the letter O are absent from the letters available for encryption.
A validity time called a cryptoperiod is assigned to each pad.
Check "How to use this tool" for information on setting up an encrypted channel using a DRYAD pad.
How to use this tool
There are two ways to use a DRYAD sheet, authentication and encryption. Both options require these following previous steps and are often combined to make sure the source is valid before using a sheet for encryption.
-
Setting up
- Select a starting and finishing time for the DRYAD to be active, this is called the cryptoperiod.
- Input or generate an ID on the controls.
- Click "Generate pad".
- Print two or more pads. Keep them secret, keep them safe.
-
Get a "Set Letter"
Before you can start encrypting you must decide on a Set Letter by following these steps:
- Think of a letter from A to Z excluding the letter Y.
- Find the fist column to the left of your pad and then lookup your letter, the row corresponding to this letter is your Set Indicator.
- Now think of a second letter from A to Z and find it in your chosen Set Indicator (i.e the horizontal row of your first letter).
- The letter to the right of the letter you just picked letter is your Set Letter.
- If there is no letter to the right your set letter is the first letter on the left of your chosen Set Indicator.
- You must repeat the previous steps if:
- You have encrypted 15 characters with the current set.
- The numbers or letters have already been used up on the current set.
- You are now ready to encrypt numbers or encrypt letters.
Encryption examples using "example" as the ID to generate the pad.
- Example 1: Imagine I pick "R" as my first letter (the set indicator). And for my second letter I choose "A"; the letter to the right of "A" on set indicator "R" is "H", so "H" becomes my set letter.
- Example 2: Imagine I pick "F" as my first letter (the set indicator). And for my second letter I choose "J"; there is no letter after "J" because it is the last of the row, so I go to the beginning of the row and "C" becomes my set letter.
-
Useful information
- - Keep the cryptoperiod as short as possible.
- - Use the authentication method before sending any ciphertext or at agreed intervals.
- - You can download and run this page locally (and offline) for extra security.
- - Try and print your sheets as small as possible, to facilitate hiding them if necessary.
- - Print as many sheets at once as messages you intend on sending and receiving.
- - Make sure you print/load your pads in a trusted location
- - Delete printer memory and delete browser cache after printing.
- - Always prefer paper pads over using this tool on a computer or device.
For Authentication
Use the rules described in the "How to use this tool" section before you are ready to authenticate.
-
Steps to Authenticate
- The challenging station selects a set letter.
- The station being challenged authenticates by picking the letter directly below the letter challenged.
- If set indicator row is "Y" (the last row in the pad) the authentication response must be the corresponding letter in the "A" row.
- Repeat the authentication process at least twice to increase its security.
- Example 1: using "example" as the ID to generate the pad.
- - "Alfa one Bravo, this is Yankee two Zulu, authenticate Delta Kilo, over."
- - "Yankee two Zulu, this is Alfa one Bravo, authentication India, over."
- Example 2: using "example" as the ID to generate the pad.
- - "Yankee two Zulu, this is Alfa one Bravo, authenticate Yankee Lima, over."
- - "Alfa one Bravo, this is Yankee two Zulu, authentication Uniform, over."
-
Useful information
- - Authentication checks and fresh tables must be renewed on a scheduled basis.
- - Any challenge/reply authentications should be crossed out in the currently used set.
- - Another challenge should be made if:
- - An incorrect reply is received.
- - If a "standby" is requested.
- - If an unusual delay occurs between challenge and reply.
- - Never give the challenge and reply in the same transmission (AKA self authentication).
- - In challenge and reply authentication, only the station responding is verified.
- - Do not accept a challenge as an authentication.
- - To verify both stations, both stations should be challenged and should reply.
- - If the challenged station does not reply in the next 5 seconds challenge them again, even if their answer is correct.
Encryption
Use the rules described in the "How to use this tool" section before you follow these steps.
-
Encrypt Digits
- The encoder selects a set letter.
- Search for the intersection between the set letter row and the marked cleartext digit column
- Choose one letter from the intersection group, this letter is your ciphertext.
- If the chosen letter already exists in the encoded ciphertext choose a different letter from the intersection group.
- In numbers with digit repetition you might have to "break" (see example below) and assign a new set letter, as you will run out of letters because of the previous rule.
- Mark out the letter as used to avoid using it again.
- Repeat this process until you have encoded all your digits.
-
Examples using "example" as the seed to generate the pad.
Number encryption of cleartext "1445":
- - "Alfa one Bravo, this is Yankee two Zulu, I set Yankee Bravo (pause) Mike Romeo Tango Echo as meeting time, over."
- Note that "as meeting time"" should be a code list digraph or other code, not a literal time.
Number encryption of cleartext "14447":
- - "Alfa one Bravo, this is Yankee two Zulu, I set November Juliet (pause) India Echo Golf (pause) I set Echo Uniform (pause) Oscar Whiskey, over."
- Note that because we ran out of cipher letters on set letter "I" we had to set a new row to continue the transmission.
-
Encrypt Letters
- The encoder selects a set letter.
- Find your cleartext letter on the horizontal alphabet just above the numbers and get the ciphertext letter at their intersection.
- Unlike number encryption, you only have one cipher letter to choose below your clieartext letter.
- If a ciphertext letter repeats itself add a "break" (see example below) and choose and new set letter.
- Never encrypt more than 15 letters without changing the set letter.
- Repeat the process with the rest of your cleartext.
Examples: using "example" as the ID to generate the pad.
Word encryption of cleartext "RETREAT":
- - "Alfa one Bravo, this is Yankee two Zulu, I set Uniform Papa (pause) Papa Charlie Tango (pause) I set Charlie Kilo (pause) Mike Golf Hotel (pause) I set Mike Golf (pause) Echo, over."
- Note that because we ran out of cipher letters we had to set a new set letter row twice to continue the transmission.
-
Decryption
- The decoder uses the first two letters in the ciphertext to determine the set letter with which the code was encrypted.
- Beginning from the third letter of your ciphertext translate the ciphertext characters back to cleartext.
- Pay special attention not to confuse code names with the ciphertext itself.
- Readjust the set letter with every new set letter.
- Repeat the process with the rest of your ciphertext until it is decoded.
Examples:
Using "example" as the ID to generate the pad.Example 1:
Decrypting the ciphertext digits "HV VXHD", transmitted as "I Set Hotel Victor (pause) Victor X-ray Hotel Delta":- - Taking the first two ciphertext letters will guide us to set letter "R".
- - Mark every letter encoded so to avoid using them again.
- - Searching for VXHD reveals the word HELP, your decrypted message.
Example 2:
A more complex example using code names. Suppose the following:- "XXX" means "encrypted latitude".
- "YYY" means "encrypted longitude".
- "XXX SQ JASIXWHNMV YYY KE SLKGJVMERX" as our ciphertext.
- - Using XXX we use SQ to get the set letter "R" resulting in decoding 0399163562.
- - The we get YYY followed by KE to get the set letter "Y" resulting in decoding 1163971546.
- - Your decoded coordinates are latitude 039.9163562 and longitude 116.3971546.
-
Encryption and Decryption tips
- - Always keep your messages as short as possible.
- - Never send more than 15 letters per set letter.
- - Never transmit the set letter over the channel.
- - Predefine a codebook to assign code names to intended communication.
Controls
-
Setting up