Skip to content

Commit d7e352a

Browse files
committed
typo
1 parent 35f062e commit d7e352a

2 files changed

Lines changed: 3 additions & 15 deletions

File tree

.github/workflows/gitLeaks.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,4 +22,3 @@ jobs:
2222
uses: gitleaks/gitleaks-action@v2
2323
with:
2424
config: .gitleaks.toml
25-

README.md

Lines changed: 3 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,8 @@
11
<p align="center">
22
<img src="./Docs/Logo.png" alt="Dojo-101" style="width: 400px;" />
3-
<br>
43
When modern communication methods fail, Morse code is still a robust fallback option. However it does not provide confidentiality.
5-
<br>
64
The purpose of this repository is to provide some tools for transmitting and receiving sensitive informations. It can be adapted to any radio equipment.
7-
<br>
5+
86
</p>
97

108
# SecCW
@@ -15,7 +13,6 @@
1513
> [!WARNING]
1614
> This repository and its tools are provided "as is" without warranty of any kind, either express or implied, including but not limited to, any warranties of merchantability, fitness for a particular purpose, and non-infringement. The authors shall not be liable for any claims, damages, or other liabilities arising from, out of, or in connection with the use of this tool. The user is solely responsible for ensuring their use of this tool complies with all applicable laws and regulations. The authors disclaim any liability for illegal or unethical use.
1715
18-
1916
## Inventory
2017

2118
| **Script** | **Use Case** |
@@ -25,8 +22,6 @@
2522
| `ReadCS8.py` | Display Signal (IQ, FFT, Amp) from a CS8 file |
2623
| `FreqToAntSize.py`| Convert Frequency to Wavelength |
2724

28-
29-
3025
## POC
3126

3227
### Cryptographic concepts
@@ -49,7 +44,6 @@ journey
4944

5045
This POC simplify the [NIST.SP.800-57](https://csrc.nist.gov/pubs/sp/800/57/pt1/r5/final) `Key States` :
5146

52-
5347
| States | Short Description |
5448
|-----|-----|
5549
| Pre-activation | Key has been generated but has not been authorized for use |
@@ -91,7 +85,6 @@ python ./MsgToCypher.py test
9185
# next iv : F2427CAF0E5EF2F65B9A2AA4D8E43F79
9286
```
9387

94-
9588
### Frequency plan
9689

9790
Obfuscation is not security, but to mitigate the risk of interception you can change frequency over time.
@@ -118,7 +111,6 @@ python .\FreqToAntSize.py <freq_hz>
118111
#Ant (cm) : YYY.YYYY
119112
```
120113

121-
122114
### Encryption
123115

124116
This exemple encrypt de message "test" using the `AES256` algorithm with `CBC` mode :
@@ -131,7 +123,6 @@ python ./MsgToCypher.py enc test 9CEA372979FFDCBA028BD523A3F43A44B527DE31E2BBAE5
131123
# cipherText: EFAADCF7EA0A786EF7B4EF7504605970
132124
```
133125

134-
135126
### Signal Processing
136127

137128
Convert to CW and write an IQ file, specify `AM` or `FM` modulation to make Morse code audible :
@@ -176,20 +167,18 @@ python ./MsgToCypher.py dec EFAADCF7EA0A786EF7B4EF7504605970 9CEA372979FFDCBA028
176167
# message: test
177168
```
178169

179-
180170
## Misc
181171

182-
**Python**
172+
### Python
183173

184174
* version: 3.13.2.
185175
* Virtual Env and dependencies: read `requirement.txt`
186176

187-
**HackRF-One**
177+
### HackRF-One
188178

189179
* Binaries: 2024.02.1
190180
* Firmware Version: 2024.02.1
191181

192-
193182
## Credits
194183

195184
* Special thanks to @jboone [for his original Morse script](https://gist.github.com/jboone/de67df55a2059dcebcdb).

0 commit comments

Comments
 (0)