From: john on
On Jan 30, 2:49 am, biject <biject.b...(a)gmail.com> wrote:

> Vanessa john who ever you are your posts sound to me like you have the
> same mind for logic as the person pushing the code.

- Probably dude that's because we've already used the software and we
depend on what we actually experienced - and only two of us in the
forum who've done it I guess... I don't care whoever is the author,
I'm only after the strength of their software as I've said earlier,
I've never seen anything like it, it's not classic.

>I am not a first
> time poster I often disagree strongly with Mr Herring and Unruh at
> least I think I do.
> I looked at the Pdf files on the site and I wish I could write as
> much as the guy who wrote those things however I did not see any facts
> in them. They if anything reminded me of the BS on global warming it
> seemed to me to be all hot air. But then again I am not an expert.
> For the record Unicity distance is very important to reject this out
> of hand is what the main stream crypto people do. I think the three
> letter agencies don't want people to know how important it is.
> The fact you have dismissed Unicity distance make me wonder if you
> really want people to use good secure crypto.

- Well, apology if it sounded like I've totally dismissed "unicity
distance", it is still of course useful in breaking a cipher - that's
classic... however, due to multiple protections of the IOTP including
plaintext compression and transformations, unicity distance isn't a
great deal anymore dude at least with the IOTP.
From: john on
>
> >The Plain Text changes in length after compression and transformation.
>
> Not relevant.
>
- Of course it's relevant dude, that denies the classic unicity
distance theory.
>
> >You will be attacking the
> >Transformed Text not the Plain Text. Password, Modification, Secret
> >Code
> >could be any length.
>
> So it's not required to be as long as the plaintext?

- Certainly dude, if it is then that's classic, if it isn't then
that's IOTP.

From: rossum on
On Fri, 29 Jan 2010 21:43:34 -0800 (PST), john <penetratorv(a)yahoo.com>
wrote:

>If by design it requires 10000
>SHA-256 in sequence to validate the password to ensure security, do
>not use this as a measure.
Your lack of cryptographic knowledge is showing. This technique is
called "stretching" and is used to slow down brute force attacks.

rossum

From: Sebastian Garth on
Apologies for not reading every single thread - I just wanted to
reiterate some of the more obvious problems here:

1) The product developer(s) hasn't disclosed the exact algorithm used,
which indicates an unwillingness to subject it to the rigorous
mathematical analysis needed to verify it's robustness (and besides
the possibility of undiscovered bugs, there is the issue of "back
doors"). How in the world could any sane person trust such a
program?

2) Any encryption algorithm worth it's salt should be able to send
everything "in the clear". Otherwise, it's nothing more than a
glorified caesar cypher, and essentially worthless for real-world
applications.

3) I may be wrong, but my gut feeling is that just about everyone here
advocating this product is most likely affiliated with the company in
some way - as a developer, marketer, or what have you. If so, just
keep in mind that if such sock-puppetry *is* uncovered, you're going
to have a snowball's chance in hell convincing anyone of anything. Not
an accusation; just a fair warning. ;)

Cheers.
From: john on
On Jan 30, 10:14 am, rossum <rossu...(a)coldmail.com> wrote:
> On Fri, 29 Jan 2010 21:43:34 -0800 (PST), john <penetrat...(a)yahoo.com>
> wrote:
>
> >If by design it requires 10000
> >SHA-256 in sequence to validate the password to ensure security, do
> >not use this as a measure.
>
> Your lack of cryptographic knowledge is showing.  This technique is
> called "stretching" and is used to slow down brute force attacks.
>
> rossum

- Whatever you call that dude, it won't bother me at all, you can copy-
paste all your cryptographical terms here, it's free. I rather don't
go off-topic or repeat things over and over again just to show to the
world that I'm an expert of SHA-0, SHA-1, 256, 384, 512 huh! You can
go over the past posts to see how a brute force attack is just not
enough to break the iotp.

John Springfield
"There's only one thing I know in this world and that is that I know
nothing - Socrates"
First  |  Prev  |  Next  |  Last
Pages: 12 13 14 15 16 17 18 19 20 21 22 23 24
Prev: Certificates
Next: Q: Kerchhoffs' principle