We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Software

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is Bubble Babble?

By Lakshmi Sandhana
Updated: May 16, 2024

Bubble babble is an encoding method where binary information is represented as pseudo-words made from alternating vowels and consonants. It is mostly used to represent cryptographic fingerprints. Created by Antti Huima, the bubble babble method makes it easier for people to remember and repeat important information easily. The encoding also has built-in error correction and redundancy, which makes it possible to spot any errors in transcription.

The methodology came into being to help people to pronounce and remember hexadecimal codes in a more natural way. It is sometimes necessary to verbally validate a key over the phone or through some other system. These public keys and the hash values of important certificates are called thumbprints or fingerprints. These types of prints are vital in verifying sensitive data for security reasons. They are typically represented as long strings of hexadecimal digits.

It's difficult for people to pronounce, remember, and repeat long strings of numbers reliably over the phone, for instance. Huima created the code to address this problem in order to easily represent forgettable binary data into more memorable pseudo-words. The term itself is a pun on the classic video game Bubble Bobble. When hexadecimal digits are encoded using the bubble babble encoding method, the generated words resemble babbling or gibberish.

This also comes in handy in situations where the valid encryption keys have been lost or are otherwise unavailable. In this case, the key fingerprint needs to be verified by the user's recollection of the original key. Fingerprints encoded using bubble babble encoding are often easier to recall than their hexadecimal versions. This makes a difference in critical situations instead of having to accept a fingerprint without authenticating it in any way.

To detect transmission errors or invalid encoding, the bubble babble encoding method contains a check summing feature. Markers that represent the start and end of a particular string of numbers are also incorporated into the encoding. For every two bytes in the input sequence, the output comes out as a dash and five characters. One of the advantages of this method is that it doesn't increase the length of the encoded information.

The pseudo-words are made using vowels and consonants in a certain way — numbers between zero and five are mapped with vowels as 0-a, 1-e, 2-i and so on in the vowel table. Integers between zero and 16 are mapped as 0-b, 1-c, 2-d and so on in the consonant table. Every vowel in the resulting pseudo-word carries 0.58 bits of redundancy. The checksum information would be around 4,640 bits for a 1,000-word string, which is helpful to detect errors like flipped bits.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
Share
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.