From: john on
On Jan 27, 4:54 pm, Noob <r...(a)127.0.0.1> wrote:
> Vanessa wrote:
> > "Knowing the exact details"? The person who gave a verdict of
> > being a BS to the software does not even know how to use it.
> > He does not know what he is talking about at the time he issued
> > his comments. Don't you know that you cannot judge a book by
> > its cover? So do not call a software a BS if you do not know much
> > about it.
>
> Are you done astroturfing yet ???

--- There are loads of rubbish replies in here "btw if a person is
screwed he'll do nothing else than troll, i can't blame him".
You seems to know better vanessa, open their locked mind but be
careful though otherwise they will gonna tell you that you're
insulting them as you're giving advise to the super-intelligent
cryptoanalyzers in the whole wide world as they may think they are.
I'm wasting my time in here now, I got my own cup of tea to look up
to. People in this forum, THANKS FOR YOUR TIME!
From: Richard Herring on
In message
<353e01c1-5dfa-40d6-bbd0-b68614275741(a)m25g2000yqc.googlegroups.com>,
john <penetratorv(a)yahoo.com> writes
>
>>
>> Whether it's an "irreversible transformation" is irrelevant. What
>> matters is whether the resulting key stream is a random sequence. If it
>> isn't, you can extract information about the plaintext *without knowing
>> the key*.
>>
>- Shannon really has been so successful to get a "extremely die hard"
>disciple of perfect randomness obscession.

I think the obsession lies elsewhere. Like with anyone claiming that a
(pseudo-) OTP is "the most advanced cryptography software I've ever seen
so far" and "it implements the concept of the true One-Time Pad to
�produce a ciphertext that is unbreakable."

>You're a legend Shannon!
>'fortunately, Shannon didn't setup a his own "religion of perfect
>randomness".

Right. And most serious practical cryptosystems in use today don't claim
to offer perfect secrecy. That's left to the advocates of pseudo-OTP
systems, like you. So I guess if there were such a religion, you'd be a
good candidate for the job of High Priest.

--
Richard Herring
From: rossum on
On Thu, 28 Jan 2010 10:10:26 +0000, Richard Herring <junk@[127.0.0.1]>
wrote:

>In message
><353e01c1-5dfa-40d6-bbd0-b68614275741(a)m25g2000yqc.googlegroups.com>,
>john <penetratorv(a)yahoo.com> writes
>>
>>>
>>> Whether it's an "irreversible transformation" is irrelevant. What
>>> matters is whether the resulting key stream is a random sequence. If it
>>> isn't, you can extract information about the plaintext *without knowing
>>> the key*.
>>>
>>- Shannon really has been so successful to get a "extremely die hard"
>>disciple of perfect randomness obscession.
>
>I think the obsession lies elsewhere. Like with anyone claiming that a
>(pseudo-) OTP is "the most advanced cryptography software I've ever seen
>so far"
That might actually be true, perhaps the previously "most advanced
cryptography software" he had seen implemented ROT-13. :)

>and "it implements the concept of the true One-Time Pad to
> produce a ciphertext that is unbreakable."
That is of course bullshit. Either it is a One Time Pad, with all the
well known advantages and disadvanteges, or it is not. This software
is not and the fact that its makers insist on calling it OTP indicate
that either they know very little about cryptography or that they are
selling snake oil. That was an inclusive 'or'. This software is to
be avoided. There is plenty of free software that is more trustworthy
than this.

rossum

>
>>You're a legend Shannon!
>>'fortunately, Shannon didn't setup a his own "religion of perfect
>>randomness".
>
>Right. And most serious practical cryptosystems in use today don't claim
>to offer perfect secrecy. That's left to the advocates of pseudo-OTP
>systems, like you. So I guess if there were such a religion, you'd be a
>good candidate for the job of High Priest.

From: Vanessa on
On Jan 28, 5:23 am, john <penetrat...(a)yahoo.com> wrote:
> On Jan 27, 4:54 pm, Noob <r...(a)127.0.0.1> wrote:
>
> > Vanessa wrote:
> > > "Knowing the exact details"? The person who gave a verdict of
> > > being a BS to the software does not even know how to use it.
> > > He does not know what he is talking about at the time he issued
> > > his comments. Don't you know that you cannot judge a book by
> > > its cover? So do not call a software a BS if you do not know much
> > > about it.
>
> > Are you done astroturfing yet ???
>
> --- There are loads of rubbish replies in here "btw if a person is
> screwed he'll do nothing else than troll, i can't blame him".
> You seems to know better vanessa, open their locked mind but be
> careful though otherwise they will gonna tell you that you're
> insulting them as you're giving advise to the super-intelligent
> cryptoanalyzers in the whole wide world as they may think they are.
> I'm wasting my time in here now, I got my own cup of tea to look up
> to. People in this forum, THANKS FOR YOUR TIME!


Before I leave this forum I want to make my points clear to everybody,
Let me discuss again the issue so as the readers will understand why
I believe that Infinite One-Time Pad is unbreakable. I will also
compare
it with the legendary One-Time Pad so you can see the difference.

The legendary One-Time Pad uses perfect random key while Infinite
One-Time Pad does not require perfect randomness. This is the
reason why majority here carelessly gave verdict to the software
as B*S*, Snake Oil, Rubbish, etc.

Let’s examine why the legendary One-Time Pad needs a perfect
random key to make it unbreakable. The strength of the legendary
OTP lies on the key. If the key is not truly random, the ciphertext
could leak information. The information leak is enough for the
cryptanalyst to deduce the plain text. For example, if a word on
the plain text is known (common words like “THE”, “AND”, “FOR”, etc),
the cryptanalyst could play on the key using cryptanalysis
techniques until a known word is revealed. This will give the
cryptanalyst a clue about how the key is generated. If not perfectly
random, say a PRNG is used; the cryptanalyst could try different
seeds until he succeeds. If the key is generated by an algorithm,
the cipher is compromised once the algorithm is known. This is the
problem with the legendary One-Time Pad. Unless the key is truly
random, the ciphertext is just like a piece of puzzle to the attacker.
If part of the plain text is revealed, other parts becomes easier to
deduce. It is clear now why the legendary One-Time Pad requires
the key to be truly random.

Now, let’s examine the Infinite One-Time Pad. Before I proceed,
I just want to note that I will be adding “Questions” for those who
are in doubt about the security because I’m sure many readers
are fanatics of the “Perfect Random Theory”.

Infinite One-Time Pad does not require the key to be truly random.
Let me present how the encryption is done according to my
knowledge of the software based from the author’s article. You may
download a copy of the software at http://www.hiddentools.com so
you can follow the following steps better.

1. When you click the “Encrypt” button. The software compresses
the plain text in memory to eliminate regularities. After compression,
it transforms the compressed text using algorithms. Let’s call this
the “Transformed Text”.

2. You will now have the option to select a file you want to use as
key.
The software extracts the key from this file. The extracted key is
filtered and transformed using series of different irreversible
algorithms.
Let’s call this the “Transformed Key”. (Note: You may type a random
key if you do not want to use a key file. In this case the software
behaves like the legendary One-Time Pad).

3. The software gives you a chance to modify the “Transformed Key”.
You may insert or replace characters at any location you wish.

4. You can now type the password. Each character of the password
re-encodes the transformed key using series of irreversible
algorithms.
This will eliminate regularities hence it doesn’t matter if your key
modification is an English word. Let me show you a very simple
irreversible transformation.

Let say the letter to be transformed is letter “A” which is equivalent
to 65 in decimal. If we add the digits, it becomes 11. Even if we know
the sum and the operation used (addition), we are uncertain about the
original number (65) because there are so many possibilities.
To list them all: 029, 038, 047, 056, 065, 074, 083, 092, 119, 128,
137, 146, 155, 164, 173, 182, 191, 209, 218, 227, 236, and 245.
There are 22 possibilities all in all.

Somebody commented that if the software is reverse engineered and
the algorithms are discovered, the ciphertext will be compromised.
Now you can see that it is not since the algorithms are irreversible.
Knowing the text and the algorithm used does not lead you to the
text prior to transformation. And notice that the key is transformed
using series of different irreversible algorithms more complex than
what I presented here.

The author is aware of this that’s why he said “If a secret algorithm
is used on software, a clever hacker could possibly analyze and
derive the algorithm. Secure encryption software therefore must not
rely on the secrecy of the methods or algorithms used.”
http://www.hiddentools.com/io-tp/art2.html.

Let's continue. After the transformations due to password, let’s
now call the transformed key the “Final Key”.

Note that the final key does not contain information about the key
modification and the password. If you say otherwise, answer
these questions.

QUESTION #1: How can you derive the “Secret Key Modification”?
What particular cryptanalytic attack will you use? How?

QUESTION #2: How can you determine the password?
What particular cryptanalytic attack will you use? How?

5. Finally when you click on “Use Key”, the “Final Key” is applied
to the “Transformed Text” in 1.

Before answering Questions 1 and 2, notice that the “Final Key”
is no longer visible. What you see now is the ciphertext.
This leads to question number 3.

QUESTION #3: How can you determine the “Final Key”?
What particular cryptanalytic attack will you use? How?

QUESTION #4: How can you deduce the “Transformed text” from
the ciphertext? What particular cryptanalytic attack will you use?
How?

I hope my points are clear now. Unless you can provide credible
answers to the questions above, you have no right of accusing
Infinite One-Time Pad as “B*S*, “Snake Oil”, etc.

I hope it is apparent that perfect random key is not necessary in
the case of Infinite One-Time Pad because the “Transformed Text”
does not leak information. This does not nullify Shannon’s
“Perfect Random Key” principle. That is still valid in the case of
the legendary One-Time Pad.

It is important that we understand the underlying reasons. Don’t
just believe and believe because it came from experts, authorities,
books, majority, etc. You must understand the reasons why.
In every rule there is an exemption.

I’m sorry John; I can’t help giving advices again.

If we confine ourselves on Shannon’s theory without thinking why,
we cannot improve the legendary One-Time Pad. Improvement
does not require us to retain all its properties.

Don’t say again “That is not a One-Time Pad therefore that is not
unbreakable”. As John said, this can be compared to “That is not
a helicopter therefore it can’t fly.” You should ask’ “That is not a
helicopter, how can it fly?”

Don’t say again “That doesn’t use a perfect random key therefore
it is insecure”. This can be compared to “That has no propeller
therefore it cannot elevate”. You should ask HOW?

Don’t say again “That is pseudo One-Time Pad therefore it is not
unbreakable, that is Snake Oil, that is a BS, Useless, Pointless,
Rubbish…

To those who are fanatics of the “Perfect Random Key” theory,
it’s time for you to wake up. Do not act like an elephant.
In Shannon’s time the elephant is still young. The elephant has
grown up and now stronger than the rope. It’s time to unlock your
mind and explore possibilities.

We are living in a changing world and evolution does not stop.
We are now in the computer age. Pencil and Paper is over.

I hope you will take this advice. I wish you good luck.
From: john on

>
> Don’t say again “That is pseudo One-Time Pad therefore it is not
> unbreakable, that is Snake Oil, that is a BS, Useless, Pointless,
> Rubbish…
>
> To those who are fanatics of the “Perfect Random Key” theory,
> it’s time for you to wake up. Do not act like an elephant.
> In Shannon’s time the elephant is still young. The elephant has
> grown up and now stronger than the rope. It’s time to unlock your
> mind and explore possibilities.
>
> We are living in a changing world and evolution does not stop.
> We are now in the computer age. Pencil and Paper is over.
>
> I hope you will take this advice. I wish you good luck.

- Just a quick one dude.. (With all due respect) I believe this
message should apply to the "crowd" whether you're 20+ years in
programming/computer industry, etc. or authored hundreds of books -
doesn't matter as the issue in here is not about history and
achievement but justification of the present issue, if you've really
got the balls then prove it. I also got more than 20 years of
electrical engineering experience in my pocket and every single year
of my experience is relevant to my passion. Btw computer age is always
changing, your 10 years expertise of cobol, fortran, turbo pascal,
etc. might be of very small use - good as newbie in today's advanced
programming, so please be open-minded at all times....
First  |  Prev  |  Next  |  Last
Pages: 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Prev: Certificates
Next: Q: Kerchhoffs' principle