From: Yannick Duchêne (Hibou57) on
Le Tue, 15 Jun 2010 20:14:25 +0200, adacrypt <austin.obyrne(a)hotmail.com> a
écrit:
> Hi,
>
> I am a bit of a loss to interpret your meaning - Do you mean I should
> promote this as something of academic interest to the refernces you
> give me or is there some mistake on my part - I would appreciate it if
> you enlighten me a bit - adacrypt
Bycause this is the first time I see an Ada job in this area, and it looks
promising.

A little note: it seems there is a CRC error in the Ada source archive. I
could not unpack it.
On the page http://www.adacrypt.com/computerised_pad.html
the link named “DOWNLOAD Joint Thin Tile Cryptography - Batch & Realtime
Source Code (22Mb)”

--
There is even better than a pragma Assert: a SPARK --# check.
--# check C and WhoKnowWhat and YouKnowWho;
--# assert Ada;
-- i.e. forget about previous premises which leads to conclusion
-- and start with new conclusion as premise.
From: adacrypt on
On Jun 15, 7:50 pm, "(see below)" <yaldni...(a)blueyonder.co.uk> wrote:
> On 15/06/2010 19:42, in article
> 2dfafa54-b744-4670-b85a-2d59d850a...(a)q12g2000yqj.googlegroups.com,
>
>
>
>
>
> "adacrypt" <austin.oby...(a)hotmail.com> wrote:
> > On Jun 15, 7:33 pm, adacrypt <austin.oby...(a)hotmail.com> wrote:
> >> On Jun 15, 7:11 pm, "(see below)" <yaldni...(a)blueyonder.co.uk> wrote:
>
> >>> On 15/06/2010 16:43, in article
> >>> 26d9422f-e704-458b-a6eb-c7ec70a28...(a)q12g2000yqj.googlegroups.com,
>
> >>> "adacrypt" <austin.oby...(a)hotmail.com> wrote:
> >>>> ... I choose to learn Ada-95 in order to implement my
> >>>> brainwave of factoring three-dimensional vectors and using three-
> >>>> dimensional space as the encryption environment in cryptography - that
> >>>> had been suggested to me by an Iraqi mathematician who had read my
> >>>> work in factoring vectors and I was convinced that Ada-95 was the only
> >>>> language for this ...
>
> >>> Why?
>
> >>> --
> >>> Bill Findlay
> >>> <surname><forename> chez blueyonder.co.uk
>
> >> Hi,
>
> >> I take you mean why did I think Ada was the more suitable language?
>
> >> I had already done some casual work on factorising large numbers in
> >> Ada-83. I had been introduced to cryptography by one Dr. Chalabi who I
> >> had asked to read my stuff on vector factoring (see "Factoring of
> >> Vectors in Vector Cryptography"http://www.adacrypt.com)-hewas
> >> active in cryptography - I soon saw an algorithm in vector factoring
> >> that is a one-way function in mathematics that is imminently suitable
> >> for cryptography - it was pure instinct from there onwards but I was
> >> convinced that the system structures of Ada-95 were ideal for what I
> >> wanted to do in cryptography. The mathematical algorithm was very
> >> transparent to me but it was going to be a problem at the time to
> >> implement it in Ada due largely to my inexperience of programming in
> >> Ada-95 - I repeat that mathematical instinct was the driving force -
> >> its the only thing I claim to have in abundance - I have taught myself
> >> enough Ada just to complete this work - I am a retired engineer and
> >> although I revere Ada programming I have no reason to go any deeper
> >> into it in a general way - adacrypt- Hide quoted text -
>
> >> - Show quoted text -
>
> > Also,
>
> > I have no idea how to proceed with any topic that you may think worth
> > expounding at some higher level - if you see any potential perhaps you
> > would let me know explicitly - I'm a bit slow on the uptake - adcrypt
>
> You are "convinced" that Ada was in some way "ideal".
> I simply ask what is it about Ada that made you consider it ideal?
>
> --
> Bill Findlay
> <surname><forename> chez blueyonder.co.uk- Hide quoted text -
>
> - Show quoted text -

I need to talk around this matter for a moment - it is more important
to say why it is ideal now rather than why I saw it as being ideal at
the outset.

A salient feature of this cryptogrpahy in additon to the mathematical
algorithm that is based upon is that it uses a new concept which I
have developed that I am calling mutual database cryptography. Mutual
database means that the entities share some several arrays of data
that are referenced i.e. indexed by the ciphertext in sequential order
that gives the data the correct structure to turn scrambled
meaningless characters into meaningful information. This is a piece
of management technology that saves sending important vulnerable keys
in transit (a sore defect in current mainstream cryptography)so that
if an adversary manages to intercept the ciphertext , something that
always has to be assumed as inevitable and indeed certain, then he
only gets a worthless string of indexing data that is useless without
the database that it relates to.

The way this works is that the sending entity, industry standard
pseudonym Alice, prepares her encryption program with all the
necessary arrays of data that she uses to encrypt plaintext messages
into ciphertext. She next creates the decryption program that enables
her to check her previous encryption work by decrypting it in her own
computer. When she has tweaked this to perfection she sends an exact
copy of her joint encryption/decryption program(s) to the receiving
entity, industry standard pseudonym Bob. Clearly she is able now to
encrypt messages now and send these to Bob knowing that only Bob alone
can decrypt it because only he has an exact copy of the several arrays
of her database. The ciphertext functions as a kind of markup
language that correctly references the mutual databases but has no
encapsulated information by way of keys within itself - it is useless
to an adversary who intercepts it - this ploy is part of my very
secure cryptpography which is further secured by other means (much
more maths later - this here is a management-orientated part topic).

It is necessary at the outset of setting up a secure loop between new
entities to make a one-off secure delivery of the copy of Alice's
database to the new Bob. It is also necessary to expand a large
network by other such deliveries to other Bob's and so on.

To get to the point the packages of Ada are ideal for these deliveries
which may be sent by unsecured email in many cases after the initial
contact is made. The construction of a cipher crypto system is very,
very manageable by using these packages for their portability and
compactness, for on-site scrambling, for slicing of arrays and general
all round mmanagement suitability. They can be used as digital
signature also if needs be. All of this topic of bears a lot of
discussion - this is just a broad outline of what is involved.

My instincts at the very outset suggested that all of this would be
serviced better by Ada than other programming languages.

I was hooked on the package as a system structure in Ada-95 from the
word go.

Cryptographers have never used this concept before now and instead
have resorted to sending secure information by transfroming the
plaintext by some mathematically functional method at encryption time
and then embedding the transformed form directly into the ciphertext
(there for the finding and inverting by some mathematical means by
illegal cryptanalysts). I call this encapsulation cryptography (a
privately coined word).

I compare this cryptography with sending cash through the post instead
of a cheque by analogy.
I hope this is intelligible to you - adacrypt
From: (see below) on
On 15/06/2010 22:20, in article
c6e6517f-bf79-4708-81f9-2412f7fd314c(a)w31g2000yqb.googlegroups.com,
"adacrypt" <austin.obyrne(a)hotmail.com> wrote:

> I hope this is intelligible to you - adacrypt

It is intelligible enough to make it clear that it is almost entirely
irrelevant to question I asked.

--
Bill Findlay
<surname><forename> chez blueyonder.co.uk


First  |  Prev  | 
Pages: 1 2 3
Prev: Subtypes boundaries
Next: Ada in Cryptography.