From: john on
> Don’t say again “That is pseudo One-Time Pad therefore it is not
> unbreakable, that is Snake Oil, that is a BS, Useless, Pointless,
> Rubbish…

> To those who are fanatics of the “Perfect Random Key” theory,
> it’s time for you to wake up. Do not act like an elephant.
> In Shannon’s time the elephant is still young. The elephant has
> grown up and now stronger than the rope. It’s time to unlock your
> mind and explore possibilities.

> We are living in a changing world and evolution does not stop.
> We are now in the computer age. Pencil and Paper is over.

> I hope you will take this advice. I wish you good luck.

- Just a quick one dude.. (With all due respect) I believe this
message should apply to the "crowd" whether you're 20+ years in
programming/computer industry, etc. or authored hundreds of books -
doesn't matter as the issue in here is not about history and
achievement but justification of the present issue, if you've really
got the balls then prove that IOTP is weak don't just jump into
conclusion that it is rubbish or bs, etc. To make your statement
stronger, why not try using it? Just imagining a certain fact is
sometimes deceiving or misinformative.
I also got more than 20 years of electrical engineering experience in
my pocket and every single year
of my experience is relevant to my passion. Btw computer age is always
changing, your 10 years expertise of cobol, fortran, turbo pascal,
etc. might be of very small use - good as newbie in today's advanced
programming, so please be open-minded at all times....
From: john on
> Don’t say again “That is pseudo One-Time Pad therefore it is not
> unbreakable, that is Snake Oil, that is a BS, Useless, Pointless,
> Rubbish…

> To those who are fanatics of the “Perfect Random Key” theory,
> it’s time for you to wake up. Do not act like an elephant.
> In Shannon’s time the elephant is still young. The elephant has
> grown up and now stronger than the rope. It’s time to unlock your
> mind and explore possibilities.

> We are living in a changing world and evolution does not stop.
> We are now in the computer age. Pencil and Paper is over.

> I hope you will take this advice. I wish you good luck.

- Just a quick one dude.. (With all due respect) I believe this
message should apply to the "crowd" whether you're 20+ years in
programming/computer industry, etc. or authored hundreds of books -
doesn't matter as the issue in here is not about history and
achievement but justification of the present issue, if you've really
got the balls then prove that IOTP is weak don't just jump into
conclusion that it is rubbish or bs, etc. To make your statement
stronger, why not try using it? Just imagining a certain fact is
sometimes deceiving or misinformative.
I also got more than 20 years of electrical engineering experience in
my pocket and every single year
of my experience is relevant to my passion. Btw computer age is always
changing, your 10 years expertise of cobol, fortran, turbo pascal,
etc. might be of very small use - good as newbie in today's advanced
programming, so please be open-minded at all times....
From: Vanessa on

> > QUESTION #2: How can you determine the password?
> > What particular cryptanalytic attack will you use? How?
>
> Selective brute force, starting with more probable passwords.

I say again, the length of the password is not limited. The
password is up to the user. If the information is too critical,
then he should use a long and strong password. Memorizing
a long password is not a problem if you are creative. For
example "@~The quick brown fox jumps over the lazy dog
- Vanessa472^#". This is easy to memorize yet very long.
Again, even if the password is correct if the "Secret Modification"
is wrong, it won't decrypt. How can you get the exact word
or character used in the modification. How can you get the
exact location. How can you determine if it has replaced
some characters or simply inserted. Trying all the
possibilities will take you forever to decryt the ciphertext.

Even though the author did not exposed the actual algorithms
the security of the encryption based from the concept is
already manifested. I believe on the security not because
the author say it is secured.

From: Vanessa on
> > QUESTION #3: How can you determine the “Final Key”?
> > What particular cryptanalytic attack will you use? How?
>
> You take the cyphertext, run the same algorithms that the program uses
> to decrypt it with your tentative password, until it results on a good
> plaintext.

You can do such desperate attack on any cryptosystem
as well. Unfortunately, in Infinite One-Time Pad, that is
hopeless if you do not know the other protections (Secret File,
Secret Modification, Secret Code).

You might be able to Brute Force the password of other
cryptosystems but not in IO-TP.
From: john on
On Jan 29, 5:10 am, Vanessa <vanessavertu...(a)yahoo.com> wrote:
> > > QUESTION #3: How can you determine the “Final Key”?
> > > What particular cryptanalytic attack will you use? How?
>
> > You take the cyphertext, run the same algorithms that the program uses
> > to decrypt it with your tentative password, until it results on a good
> > plaintext.
>
> You can do such desperate attack on any cryptosystem
> as well. Unfortunately, in Infinite One-Time Pad, that is
> hopeless if you do not know the other protections (Secret File,
> Secret Modification, Secret Code).
>
> You might be able to Brute Force the password of other
> cryptosystems but not in IO-TP.

- That's why dude, with my years of experience securing design data I
found the software simply the best and is very handy and easy to use -
I've never had trouble using it. You're right, password is not
difficult to fabricate and memorize, I don't know about Paulo maybe he
struggled to memorize the "quick brown fox dah dah dah......". Ask a
college junior and he'll tell you the resistor colour codes via "Bad
Boys R*ped Old....." and a school boy telling you the colour of a
rainbow "Richard Of York Goes Battling.....". Frankly, some encryption
software around specially the well exposed open-sources and other free
softwares are just absolute shites,... you really just get what you
pay for (sorry I'm not paid to advertise but that is a reality). As a
normal user, you don't need to become Alan Turing to use encryption
software otherwise years of cryptology training should be provided to
users prior to their use of encryption softwares - and we all know
that this procedure is an absolute bullshit. The integrity of a
software can be at least be judged by just knowing how it works, the
security flowchart, etc. otherwise only Paulo and company are allowed
to use such encryption software which is obviously unfair to everyone
including ME.
First  |  Prev  |  Next  |  Last
Pages: 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Prev: Certificates
Next: Q: Kerchhoffs' principle