Difference between revisions of "Code Cards"

From Airsoft Information
Jump to navigation Jump to search
(Created page with "The following post summarizes information learned from [[http://www.abebooks.com/servlet/SearchResults?sts=t&tn=paintball+airsoft&x=57&y=5 Paintball and Airsoft Battle Tactics...")
 
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
The following post summarizes information learned from [[http://www.abebooks.com/servlet/SearchResults?sts=t&tn=paintball+airsoft&x=57&y=5 Paintball and Airsoft Battle Tactics]] by Christopher Larsen about simple wireless or radio encryption.   
+
([[ Radio Protocol ]])
 +
 
 +
The following post summarizes information learned from [http://www.abebooks.com/servlet/SearchResults?sts=t&tn=paintball+airsoft&x=57&y=5 Paintball and Airsoft Battle Tactics] by Christopher Larsen about simple wireless or radio encryption.   
  
 
The simplest encryption is to use existing words in ways they were not originally intended.   
 
The simplest encryption is to use existing words in ways they were not originally intended.   
Line 11: Line 13:
 
* locations
 
* locations
  
{| class="wikitable"
+
[[File:codecards.png]]
!Authentication !!Resources !!!Locations
 
|-
 
| ? ? ? ? ? ? ? ? ? ?  || REQUEST      =        |
 
| 1 2 3 4 5 6 7 8 9 0  || REINFORCEMENT =        |
 
|                      || TIME          =        |
 
                      || AMMO          =        |
 
                      || BATTERIES    =        |
 
                      || MEDIC        =        |
 
                      || FOOD          =        |
 
                      || WATER        =        |
 
|- questions
 
|- passwords
 
                      +-------------------------+
 
SITREP  =            | sitrep                  |
 
LOCATION=            |                        |
 
+---------------------+ MOVING          =      | 
 
answers              | HALTED          =      |
 
                      | IN RALLY PT    =      |
 
YES =                | AT OBJECTIVE    =      |
 
NO  =                | ENEMY SPOTTED  =      |
 
+---------------------+ COMPROMISED    =      |
 
prepositions        | CASUALTIES      =      |
 
                      | MISS'N COMPLETED=      |
 
AT/TO =              |                        |
 
UNTIL =              |                        |
 
+---------------------+                        |
 
orders              |                        |
 
                      |                        |
 
MOVE      =          |                        |
 
HALT      =          |                        |
 
ATTACK    =          |                        |
 
WITHDRAW  =          |                        |
 
CONTINUE  =          |                        |
 
RENDEZVOUS=          |                       
 
|}
 
  
 
The authentication code would be a 10-letter word you could use to check to see who you are getting orders from (for example).  You would choose a letter or number and the person in question would respond with the correct corresponding letter or number.  Teams could choose how far down the word and the direction the day's authentication would be:  two digits left, for example.
 
The authentication code would be a 10-letter word you could use to check to see who you are getting orders from (for example).  You would choose a letter or number and the person in question would respond with the correct corresponding letter or number.  Teams could choose how far down the word and the direction the day's authentication would be:  two digits left, for example.
Line 53: Line 20:
  
 
The rest of the codes can be chosen after a theme:  fish, pets, foods, plants, etc.
 
The rest of the codes can be chosen after a theme:  fish, pets, foods, plants, etc.
 +
 +
Using the [[Flower Code]].

Latest revision as of 06:26, 14 March 2013

(Radio Protocol )

The following post summarizes information learned from Paintball and Airsoft Battle Tactics by Christopher Larsen about simple wireless or radio encryption.

The simplest encryption is to use existing words in ways they were not originally intended.

Larsen suggests carrying a reference card that covers your team codes. The card includes the following information:

  • authentication codes
  • questions and responses
  • orders
  • requests
  • situation reports
  • locations

Codecards.png

The authentication code would be a 10-letter word you could use to check to see who you are getting orders from (for example). You would choose a letter or number and the person in question would respond with the correct corresponding letter or number. Teams could choose how far down the word and the direction the day's authentication would be: two digits left, for example.

The passwords could include the running password and the base password.

The rest of the codes can be chosen after a theme: fish, pets, foods, plants, etc.

Using the Flower Code.