From: john on
from UNRUH on Infinite One-Time Pad:


> Secret Code - You can create a new secret code so that the software will
> use this value every time you encrypt a text. The secret code is used to
> transform the input text and the key. Every single character of the secret
> code is used in the transformation. The number of transformations is equal
> to the length of the secret code.

????

*** This means the code that comes after your first encryption i.e.
using the file of your choice. Say, if your secret code is KEEPME123
then the encryption will transform when you key-in the letter K then
transforms again with the letter E and so on but there's no turning
back when you made a mistake of keying-in as the current
transformation won't go back to the transformation 1 step back, it
will when you reset keying-in the secret code but you must start the
transformation by keying the letter K again.

> Key Modification - You can insert words or characters to the key for
> additional protection.

This helps how?

*** to totally strengthen the initial encryption made by your chosen
FILE (could be the pic of your girl or any file in your system). i.e.
when the first ecryption response made by the file reads as
ru9ew783ure8u4*&^4^eooe..., you can make variation by making it this
way ru9ew783urJOHNe8u4*&^4^eooe... (you can do more complex variation
according to our liking), so even if they got the file you've used,
they'll never know the variation you've made hence making the
acquiring of the secret file useless.

***** These are at least in the user's point of view... I've honestly
no idea if the program behind it is weak and hackers can dismatle it
bit by bit as I'm not the developer but based from the encryption
flowchart - it seems to me that it is indeed unbreakable. John
From: Peter Fairbrother on
john wrote:
[...] but based from the encryption
> flowchart - it seems to me that it is indeed unbreakable.

Then it's obvious to me that you know little or nothing about
cryptography, and are unfit to offer an opinion.

-- Peter Fairbrother
From: john on
On Jan 25, 7:49 pm, Peter Fairbrother <zenadsl6...(a)zen.co.uk> wrote:
> john wrote:
>
> [...] but based from the encryption
>
> > flowchart - it seems to me that it is indeed unbreakable.  
>
> Then it's obvious to me that you know little or nothing about
> cryptography, and are unfit to offer an opinion.
>
> -- Peter Fairbrother

- It's also obvious to me that your understanding is quite short,
carelessly giving a conclusion based only from a single sentence.
Thanks for your opinion anyway, but at least my meticulous opinion is
supported by facts and is not without basis like calling a software BS
without even knowing how to use it which is far more unfit.
From: john on

> You appear to be confusing different meanings of "crack".
> Cracking software means patching it to circumvent whatever technology it
> uses to enforce licence conditions.
> Cracking an encryption system means finding a way to get plaintext from
> ciphertext without knowledge of the key.
> These are very different things.
>
- ... but they have the same "name" hence the confusion (by the
reader). Of course they are different in meaning. Never did I say that
software cracking is the same as cracking/decrypting a code. I did
mention both of them but in different scenario - one is cracking the
iotp software (license) and the other is the cracking of the encrypted
code I've shown above. Whilst true that cracking the iotp software is
by no means related to decrypting the code, I just consider them both
at least in my own satisfaction...

>
> Does the phrase "unicity distance" mean anything to you?

- To be honest with you dude "unicity distance" is now meaningless
IMHO.. though it has been the foundation of early cryptography - its
now the thing of the past - getting possibilities is almost infinite -
you can rumble your arithmetic, algebra, trigonometry, geometry,
calculus, differential equations, statistics, matrices, etc. etc.
these will only get you to nowhere... the length of the encrypted code
I've shown above is NOT the same in length of the actual message or
the secret key just to let you know and applying your mathematics to
dig any connection is hopeless.... The world is now manipulated by
high-powered computer with state of the art programming dude! The
great cryptography oracle Alan Turing of Bletchley Park has long been
dead.


> >> Don't go WOW! though - this is full of holes, and while a single short
> >> ciphertext may not be breakable, longer ones *will* be.
> >> It isn't safe or secure.
> >- How'd you know? With due respect, are you a programmer? Are you
> >familiar at least the latest .net technology framework? me, I'm not.

> Moreover, you apparently don't understand why that's irrelevant.
> Cryptanalysis isn't programming, it's mathematics.
>
- Computational Mathematics to be exact sir. Although classical
mathematics is the basic foundation, this has now been integrated to
various computer techniques i.e. the power of computer programming
(computer science). I think you're still living with paper and pen
dude - that's a disaster to modern cryptoanalysis.


> >> Also, I don't see anything which limits reuse of a keyfile and password
> >> - breaking a pair of ciphertexts which use the same XOR key is trivial.
>
> >- But IOTP is different in many ways dude.
>
> Name five.
>
- Just look at the website dude, hiddentools.com but please don't
think of the concept of the classic perfect randomness at this point
in time so you can free yourself from the legacy of "unicity
distance".

> >> So yes, it's BS.
>
> >- No it's not, othewise prove it.
>
> It doesn't work like that. The onus is on you to provide a proof (in the
> mathematical sense) of security.

- The proof has been delivered but need to be digested and well
understood by the reader.

> --
- John Springfield

From: john on
Richard, before I forget ---- "It seems that you are already
captivated with Shannon's Principle. It's time to free yourself dude!
Wake up, it's 2010! We are already living in the rapid advancing
Computer Age. When you say that "The key is not random therefore it is
not secure", as if you were saying "It is not a helicopter, therefore,
it cannot fly..." Take it from me dude, "clinging to Shannon's
Principle is very disastrous to the world of cryptography as it
prevents advancements". The Infinite One-Time Pad is the most advanced
cryptography software I've ever seen so far - only for advanced people
though not for the vintage war-time cryptographers.
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Prev: Certificates
Next: Q: Kerchhoffs' principle