Tim's Reasonably Adequate Concepts

Presents


RAP
(a parody)


Reasonably Adequate Privacy

Data Obfuscation for the Masses







RAP User's Guide

Volume I: Essential Topics



by Timothy Ruddick
tim /at/ ruddick /dot/ com

Revised 13 October 1996






RAP Version 0.91 beta - 13 October 1996


Documentation by

Timothy Ruddick



Hardware by

Sunkist and General Electric







Synopsis: RAP uses a simple chemical process to protect data. Communicate easily with people you've never met, with minimal prior training. RAP is simple to use and fast, with robust construction, very low computational cost, and adequate ergonomic design.




Documentation © 1996 Timothy Ruddick.

RAP Version 0.9 beta - 27 April 1996
RAP Version 0.91 beta - 13 October 1996
RAP Version 0.92 beta - 4 April 1999
RAP Version 0.93 beta - 5 September 2006


All rights reserved. For information on RAP licensing, distribution, copyrights, patents, trademarks, liability limitations, and export controls, see the "Legal Issues" section in the "RAP User's Guide, Volume II: Special Topics". Distributed by Ruddick Institute of Silliness.





"This is a dog license with the word 'Dog' crossed out and 'Cat' written in in crayon"

-Monty Python, Eric the Half-a-Bee


Contents


Quick Overview

Reasonably Adequate Privacy (RAP), from Tim's Reasonably Adequate Concepts, is a simple concealment concept requiring only hardware available at the local supermarket. RAP allows people to exchange written documents with reasonable privacy and convenience. Reasonable privacy means that only those intending to receive a message and possessing the appropriate hardware can read it. Convenience means that privacy is provided without the need for any software or computer hardware, whatsoever. No secure channels are needed to obtain the necessary hardware, which makes RAP easy to use. This is because RAP is based on a simple technology known as "invisible ink".

RAP combines the convenience of ordinary handwriting systems with obfuscation speeds impossible to match with conventional cryptography, data compression, adequate ergonomic design, and simple hardware requirements. And RAP performs its functions faster than any software implementation. RAP is truly data obfuscation for the masses.

RAP does not provide any built-in modem communications capability. In fact it provides no data-transmission capabilities whatsoever. You must use separate products for that.

This document, "Volume I: Essential Topics", only explains the essential concepts for using RAP, and should be read by all RAP users. "Volume II: Special Topics" covers the advanced features of RAP and other special topics, and may be read by more serious RAP users. Neither volume explains the underlying chemical processes used by the technology.

Why Do You Need RAP?

You want to transmit a message or some data and you don't want anyone else to see it.

Duh!

How it Works

Conventional cryptosystems require complicated hardware and software to scramble a message, rendering it unreadable to anyone but you and the intended recipient.

With invisible ink there is no need for all that stuff. You just need:

Using the heat-source the recipient can cause the invisible ink to become visible.

Anyone can use invisible ink to conceal a message to another person. Only a person who knows that the document contains a "secret message" will think to use a heat source to render the message visible.

Message authentication is also provided. One way would be for the recipient to call the sender on the phone and say something like, "Hey! Did you just send me a blank piece of paper?" And the sender could say something like, "Yes…" and pause, knowingly.

These two processes can be made to occur automatically whenever a sender creates a document using invisible ink. There is no need to acquire any information about the recipient at all!

Installing RAP

The Basic RAP package comes complete with a box of styli (styluses for the Latin-impaired), several sheets of message substrate, an ink-source, and a heat-source. The Professional package contains a secondary ink-source, known in the industry as a "potato" (or "potatoe" to those working for former CIA staff), and a high-quality stylus similar to those sold at calligraphy counters of art and craft supply stores.

Installation of RAP is as simple as removing the parts from their box and placing them near where you wish to compose your message.

If you already own an earlier version of RAP there is no need to dispose of it. All items in any version are guaranteed to be fully compatible with all past and future versions and can even function in parallel! (Try to do that in software!)

In addition, you may find that you already own items similar to those found in a RAP package. These, too, should be fully compatible, except in the case of heat-sources purchased outside the U.S. Unlike certain other cryptosystems there are no export restrictions on any item in the RAP package; you may find, however, that heat-sources produced in the U.S. are incompatible with foreign fixtures.

How to Use RAP

Obfuscating a Message

Obfuscating a message is simple. Dip the stylus into the ink-source and use it to write on the message substrate. You may find that certain styli are easier to use than others. Experiment until you find a stylus that functions adequately and practice a little. You'll soon find that writing becomes easy.

Compressing a Message

If you wish, you may compress messages after using RAP. It is easiest, however, to wait until after obfuscation to perform compression. One method is to fold the message substrate into thirds, so that it may more readily be inserted into an standard document carrier (or "envelope"). To foil Message Interception Attacks you might consider crumpling the substrate into a ball so that it resembles an item of trash. More elegant and artistic solutions to the same problem may be found in any good origami book.

Obfuscating a Message to Multiple Recipients

If you want to send the same message to more than one person, you have several choices: you can write the same document on more than one substrate; you can find a print shop willing to use your invisible ink during the production process; or you can try to ensure that all recipients are present when the document is made visible.

Signing a Message

Sign a message much as you would sign a check. The only difference is that you will not be able to read the signature. It will be invisible. You're using invisible ink.

Using Additional Obfuscation

Sometimes you need a little extra obfuscation. RAP can also work in this environment. If you and the recipient both know a foreign language, you could write in it. If you don't know a foreign language, consider Pig-Latin (known in the industry as "Igpay-Atinlay"); it is an easy language even for non-native writers, and has the expressive power of English.

Revealing Messages and Checking Signatures

To make an obfuscated message visible, hold the message substrate over a heat source. The message will soon become apparent. If the message has been signed you will see a signature on the substrate.

If the substrate is held too close or too long next to the heat-source you risk Rapid Oxidation and Message Loss (ROML or "fire"). You may also damage your fingers, eyebrows, or hair, so be careful!

Managing Keys

Since the time of Julius Caesar, key management has always been the hardest part of cryptography. One of the principal distinguishing features of RAP is that it uses no keys. The hardest problem simply vanishes (just like the ink)!

Advanced Topics

Most of the "Advanced Topics" are covered in the "RAP User's Guide, Volume II: Special Topics". But there is one topic that bears mentioning here.

Sending Obfuscated Messages Through the Postal Service

Any message sent through the Postal Service should probably be enclosed in a document carrier, the simplest being an envelope. To save on postage and envelope costs you may wish to consider compressing the message prior to sending it. Various techniques for accomplishing this are outlined in the "Compressing a Message" section, above.

Invisible ink would seem to lend itself well to message delivery via postcard. RAP does not support this mode of transport, as postcards are difficult to use with a heat-source which increases the likelihood of ROML (see "Revealing Messages and Checking Signatures", above).

It should be strongly stressed that to avoid a Message Interception Attack the recipient's address should be written in standard, visible ink!

Configuring RAP

RAP has few user-serviceable parameters. If you wish you may experiment with alternate styli, heat-sources, ink-sources, and message substrates, but the basic concepts remain the same.

Vulnerabilities

No data security system is impenetrable. RAP can be circumvented in a variety of ways. The greatest vulnerability is message interception by parties owning heat-sources.

Try to make sure that this doesn't happen.

Beware of Snake Oil

It doesn't work and you have to find a snake. Lemon juice is better.

Notice to Macintosh Users

RAP is fully compatible with your choice of computer. You will find the user interface elegant and intuitive, and far better than those command-line things you'd otherwise need to put up with.

RAP Quick Reference

Summary of RAP functions

To obfuscate a message:

To sign a message:

To reveal an obfuscated message:

To obfuscate a message for any number of multiple recipients:

Key management functions

To make your keys easier to find:

Legal Issues

For detailed information on RAP licensing, distribution, copyrights, patents, trademarks, liability limitations, and export controls, see the "Legal Issues" section in the "RAP User's Guide, Volume II: Special Topics".

RAP uses technology that is unpatentable. Seriously, who besides a raving genetic engineer would try to patent a lemon. As such, you are free to redistribute the RAP hardware and this document in any way you see fit, provided the text remains unaltered.

Acknowledgments

Substantial portions of this document were basically stolen outright from Phil Zimmermann's documentation for his excellent Pretty Good Privacy (PGP) product.

PGP is available on the Web at:

This document may shortly be available on the Web at: