From: Mark Murray on
On 07/16/10 07:03, adacrypt wrote:
> To me this seems the obvious thing to do. I can�t understand why I am
> being admonished to read bytes instead of plaintext as it appears.

You are being asked not to make a distinction between "bytes" and
"plaintext", as real cryptography is content-agnostic.

The "bytes" _are_ the "plaintext" (and /vice versa/). The
resultant "ciphertext" is also "bytes".

M
--

From: Mok-Kong Shen on
adacrypt wrote:

> What I want to know is the mechanics of the external interface with
> the human operator - does that person key in the data directly to the
> keyboard (please take it that only security of information is being
> considered here) in all cases. If so is this the norm for most general
> cases - thanks again - adacrypt

Thomas has told you that the source can be of widely different nature.
So the 'norm' and the 'most general cases' can vary also, dependent on
the kind of applications. If what is to be encrypted is e.g. pictures,
then the files can stem directly from digital cameras and there is
practically no keying on the keyboard except for the commands of the
operating system. Text documents may be scanned, etc. etc. A modern
crypto software should thus be able to process an arbitrary user-given
bit sequence.

BTW, in another thread of yours I mentioned that you should 'once' spend
some effort to explain your encryption scheme concretely and concisely
and in terms that are readily to be understood by many so that it could
be thoroughly examined and discussed. You seemed to dislike that and
instead attempted to ask some 'peripheral' (with respect to your
scheme) questions in a number of threads, IMHO.

M. K. Shen

From: Tom St Denis on
On Jul 16, 4:55 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
> That's fine for what happens internally as called for by the cipher
> program algorithm.
> What I want to know is the mechanics of the external interface with
> the human operator - does that person key in the data directly to the
> keyboard (please take it that only security of information is being
> considered here) in all cases. If so is this the norm for most general
> cases - thanks again - adacrypt

So what we have here is the author of revolutionary cryptography that
will change the world who doesn't know how computers work and thinks
that people actually type by hand their symmetric keys into ciphers.

Tom
From: Paulo Marques on
Tom St Denis wrote:
> On Jul 16, 4:55 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
>> That's fine for what happens internally as called for by the cipher
>> program algorithm.
>> What I want to know is the mechanics of the external interface with
>> the human operator - does that person key in the data directly to the
>> keyboard (please take it that only security of information is being
>> considered here) in all cases. If so is this the norm for most general
>> cases - thanks again - adacrypt
>
> So what we have here is the author of revolutionary cryptography that
> will change the world who doesn't know how computers work and thinks
> that people actually type by hand their symmetric keys into ciphers.

My vote is for no discharge for this patient either ;)

--
Paulo Marques - www.grupopie.com

"There cannot be a crisis today; my schedule is already full."
From: Gordon Burditt on
>My question is this: How in general, in modern Western cryptography
>is textual data for encryption entered into a computer. Is it keyed
>in interactively at the keyboard or is it read in from prepared
>external batch files. I am speaking of ordinary plaintext from the
>character set of printable ASCII.

I do not enter ordinary plaintext (whether it's for encryption or
not) from the character set of printable ASCII. Even one line of
plaintext ends in a newline.

If it's anything complicated (even one line can be complicated),
and it's not already machine-readable, I'm going to be typing it
into a text editor. (That text editor may be creating files on an
encrypted filesystem. Or maybe the message only needs encryption
for sending over the Internet via email.)

In pretty much all cases of text files, it is important that the
newlines stay where they are. Failure to do this can render source
code unusable, and make poetry unreadable. It makes CSV files
unusable. In no case is it acceptable to limit line lengths by
inserting a newline in the middle of a word.

Stuff that I encrypt is generally not so sensitive that I can't
keep it available unencrypted to work on it. (Why keep around
secret stuff if you can't use it for something?) It may be stored
on an encrypted file system, but when it's mounted, I can access
it transparently without having to deal with the encryption at that
point. Unmount the encrypted file system, and it can't be accessed
without the passphrase. The threat is more of an email going astray
or getting intercepted over the Internet, or perhaps a lost or
stolen laptop, than someone using my computer when I turn away from
the computer to talk to someone else with the encrypted filesystem
mounted.

The data is generally stored in a file in a form so I can *USE* it,
whether that is a text file, a word processing file, a spreadsheet,
an image, or whatever. You may think of those as "batch files" for
encryption, but I'm more concerned with being able to *use* the
files, and these are file types appropriate to the application. If
I send someone an encrypted email, it's probably important enough
that I keep a copy, at least until I'm sure he got it and answers.


>My own ciphers are designed to 1) handle large-volume secure
>communications by reading plaintext in from external batch files and
>writing out the ciphertext that emanates from the encryption to
>another dedicated external file that may then be transmitted by
>electronic means and 2) short impromptu email messages are keyed in
>from the keyboard in interactive mode, encrypted, and the ciphertext
>is then written to an external file for transmission by electronic
>means.

It's unlikely I'm going to use (2) much at all. If it's used often
enough, I'll have a script that brings up a text editor, then
encrypts and sends the message when it is done.

Your ciphers (you claim) are theoretically unbreakable but they are
theoretically unbreakable *EVEN WITH THE KEY*, since they mangle
plaintext irretrievably.

>To me this seems the obvious thing to do. I can�t understand why I am
>being admonished to read bytes instead of plaintext as it appears.
>
>Surely it would be retrogressive to prepare plaintext as bytes instead

It is unnecessary to "prepare plaintext as bytes". It already *is*
bytes. If ADA can't do this (and it *can* do this, but you don't
seem to know enough ADA to figure out how), dump ADA. You don't
seriously think someone is suggesting that you to "prepare" a file
filled with ASCII 1's and 0's in groups of 8, do you?

I've got programs on my computer that can encrypt an arbitrary file
in one of many ciphers, then decrypt it back and get exactly the
same file contents as the original. Why can't yours do the same
thing?

>of just letting the computer do that.

Don't you get it? I don't have to "prepare a batch file", an
application file is already there. I have a spreadsheet with an
inventory of the computers on the network. It gets updated often
as things change. If the boss wants a new copy, I send it as an
attachment to an email. No, it's generally NOT needed to do an
"export to ASCII", and in any case, messing up the newlines in
an export will mangle the data when it's imported. The file gets
run through encryption, then base64 to give a palatable character
set for email, and made into an attachment.

>What gives here? - adacrypt

You don't understand how people use computers. Perhaps your brain
is theoretically impenetrable by common sense. You've designed
cryptography that can only encrypt and decrypt a near-empty subset
of documents used today.