From: Richard Herring on
In message <hjphh1$6qv$1(a)speranza.aioe.org>, Noob <root(a)127.0.0.1>
writes
>Bruce Stephens wrote:
>
>> If you want software that's not a one-time pad but claims to be as good
>> as, why not choose a free one? For example, Adacrypt
>
>Hold on a minute.
>
>Are you seriously recommending Adacrypt's snake oil?


Why not? It's an excellent example of "software that's not a one-time
pad but claims to be as good as", _with all that implies_.

--
Richard Herring
From: Paulo Marques on
Vanessa wrote:
> On Jan 27, 8:59 pm, Paulo Marques <pmarq...(a)grupopie.com> wrote:
>> So, all the file transformations and key transformations, etc., are
>> pretty much pointless and just show that whoever designed this product
>> doesn't understand cryptography at all.
>
> The "Secret Code", "Secret File", "Key Modification", and "Password"
> are unknown to the attacker? How can the attacker reproduce them?"

You seem to be arguing under the assumption (that many people make, btw)
that if a software author doesn't disclose something about its
internals, then it is "secret".

This is very, very, very far from the truth. If the algorithm is being
used in the software, then it is as good as public. Any decent cracker
can open the software and check the algorithms. It might increase
slightly the work that as to be done, but that's just it, a slight nuisance.

Just watch this video to get an idea of how this works:

http://hexblog.com/decompilation/video/vd1.html

or this video (longer):

http://www.ccso.com/files/hexraysdemo.swf

So, from all of the above, if the attacker steals your laptop and the
secret file is there, the only thing that stands between him and the
plain text is your password.

> People here are very good in theories. I hope you will grow in your
> carrer. The world needs people like you.
> Thank you so much for your time.

You're welcome :)

As long as people are honest about their intentions, and are really
looking to understand how cryptography works, I don't mind using a few
minutes of my time to help out.

--
Paulo Marques - www.grupopie.com

"I used to be indecisive, but now I'm not so sure."
From: Noob on
Vanessa wrote:

> "Knowing the exact details"? The person who gave a verdict of
> being a BS to the software does not even know how to use it.
> He does not know what he is talking about at the time he issued
> his comments. Don't you know that you cannot judge a book by
> its cover? So do not call a software a BS if you do not know much
> about it.

Are you done astroturfing yet ???
From: john on

>
> Whether it's an "irreversible transformation" is irrelevant. What
> matters is whether the resulting key stream is a random sequence. If it
> isn't, you can extract information about the plaintext *without knowing
> the key*.
>
- Shannon really has been so successful to get a "extremely die hard"
disciple of perfect randomness obscession. You're a legend Shannon!
'fortunately, Shannon didn't setup a his own "religion of perfect
randomness".

From: Gordon Burditt on
>> Let me try to be clearer. The process you described is:
>>
>> PlainText (PT) -> [box of deterministic algorithms] ->
>> � transformed text (TT) -> [transform with secret file + password] ->
>> � � cypher text (CT)
>>
>> Correct?

No, not really, he's left out a lot of pieces of the key which also
enter into the computation, although if you change "transform with
secret file + password" to "transform with all the wierd pieces of
the key", I think that's what's intended.

>Correct, but you should know that "Password" is not the only
>protection
>you can implement.

Please generate an IOTP key and post it here. You don't have to
ever *USE* the key. You seem to be desparately avoiding including
the "optional protections" as part of the key, when you should
include them (It makes your argument stronger).

The key includes all of the "optional protections" you may or may
not use (specifically state that you don't use one if that's the
case) if that's required to be known by the recipient in order to
decrypt the message (using the ciphertext, his own downloaded copy
of the program, and the key, and no other shared secret information).
I suggest using all the optional features to show off how jinormous
the key can be.

The attacker is assumed to have captured the ciphertext, have his
own downloaded copy of the program (and he's presumably disassembled
it and figured out the algorithm it uses), and have none of the
parts of the key.

People seem to be jumping on the fact that "optional protections"
are not disclosed when they're really part of the key. Imagine
if the key to decrypt a message was:
The password is "jlj3l5klj4byh9h4eo2ht94yhouhqfo2hiu4y6uihkjvhi2".
Lift the toilet seat, but don't put anything in the toilet.
Use the file /vmunix on your computer concatenated with the
archive of spam emails from 1997.
Turn off the porch light.
Set the television to channel 3, but turn it off.
Don't wipe your nose. Do wipe your left thumb.
Face Northeast.
Shave the left side of your face only.
The launch code is "CPE1704TKS".
The secret holiday is "Barak Obama's Kindergarten Graduation".
The insect of the day is the "Madagascar Pissing Cockroach".

and if you get any one or more of these wrong, the message won't
decrypt properly. That may be a bit less conventional than using
a bit string as a key, but it can work just as well.
First  |  Prev  |  Next  |  Last
Pages: 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Prev: Certificates
Next: Q: Kerchhoffs' principle