10 paper encryption methods for students using ABBYY FineReader

    Way times


    Create Encryption




    Copy the text into MS Word, make it of the same size and formatting, and apply some icon font to it, such as Webdings or any other. We print and send the received encryption to a friend.

    Your friend, of course, is a sailor, and will easily and quickly read the received encryption. But imagine that you sent a friend not a line, but many lines. What to do then?

    Decryption Preparation


    Key creation



    In order for your friend to easily decrypt it, he needs to pass the key. In some cases, he can create the key himself. But we will help him in this difficult matter and, similarly to encryption, we will create the following file:



    An attentive reader can notice that there are exactly 26 flags, and assume that he sees the English alphabet in front of him, and, of course, he will be right.

    Creating Standards



    Scan the key in FineReader. We choose the English language of recognition, recognition with training and prohibit the use of built-in standards. Click "Recognize." Now about each letter we will be asked what kind of letter it is: We type



    in turn the letters of the alphabet and click "Train". 52 clicks - and the standard is ready. Do not forget to save the standards for future use, otherwise training will have to be done every time. The resulting standards can be viewed in the editor of standards:



    The whole process takes 5-10 minutes, but may take longer if you do not know the location of the English letters. In this case, it is recommended to mark already used keys on the keyboard to speed up the search for the remaining ones.

    Decryption


    Now turn off the training mode, scan and recognize the encryption text itself. Voila - and we have the result:



    An attentive reader will say: so what? Why is this needed? Oddly enough, this can find many uses, for example:

    • create standards for the font xkcdRightHand and easily extract texts from pictures of your favorite comic strip;
    • create standards for some non-standard font and digitize an old book;
    • carry out a quick search of elven books written in Tengwar or Kertar;
    • assistance in digitizing texts whose author considers himself the most intelligent and inserts strange characters everywhere.

    A novice conspiracy theorist will say that hacking such a cipher is just a spit: we look at statistics on the use of letters, analyze short words, and the key is unraveled. In this case, add garbage characters to the source text, or encode it in Base64. Now imagine that, for example, the g-font is used for encryption:



    I think after a couple of minutes of visual analysis, there will be one J.

    Way two


    Create Encryption



    We take a book from the shelf, which is not a pity. I am sure that now people will come running here who will say that such books do not exist. But believe me: since you have embarked on the path of encryption, then there should be nothing sacred for you. Therefore, forward. We take the book, and (it’s better not to read the impressionable one further), remember that we want to convey only one word: “pine”, leaf through the book, find what we are looking for on page 117, and modify it:



    Close the book and send it to a friend.

    Decryption Preparation


    Making secret words



    We agree in advance with another set of secret words that must satisfy the following condition: they must contain the letters "c" or "l", for example, pine, squat, speech therapist.

    Dictionary Creation


    A friend saves these words in a txt file, with minor changes: osna, equit, pogoped; after which it imports it into the user dictionary of a freshly created language in FineReader:



    Decryption


    Scan the resulting book and recognize it in our language. We are looking for mutated words in the text, we find “osna” and rejoice. Thus, having spoiled using only one book, we passed the secret word. This technique is based on the fact that when recognizing similar letters, a dictionary check is used, and we specially distorted the words and created a dictionary for them. If a third-party person does not know the list of secret words, then it will be difficult for him to single out the same word from the book, because when recognized by the built-in recognition language, it is recognized as “pine”, thanks to the same dictionary check.



    In general, the creation of your own dictionaries allows you to improve the recognition of frequently occurring proper names, abbreviations and alphanumeric sequences, for this in the user language, instead of a dictionary, you can specify a regular expression for verification.

    And we want to finish with the following words:


    Also popular now: