From: john on
>You appear to be confusing different meanings of "crack".
> Cracking software means patching it to circumvent whatever technology it
> uses to enforce licence conditions.
> Cracking an encryption system means finding a way to get plaintext from
> ciphertext without knowledge of the key.
> These are very different things.

- ... but they have the same "name" hence the confusion (by the
reader). Of course they are different in meaning. Never did I say that
software cracking is the same as cracking/decrypting a code. I did
mention both of them but in different scenario - one is cracking the
iotp software (license) and the other is the cracking of the encrypted
code I've shown above. Whilst true that cracking the iotp software is
by no means related to decrypting the code, I just consider them both
at least in my own satisfaction...


> Does the phrase "unicity distance" mean anything to you?

- To be honest with you dude "unicity distance" is now meaningless
IMHO.. though it has been the foundation of early cryptography - its
now the thing of the past - getting possibilities is almost infinite -
you can rumble your arithmetic, algebra, trigonometry, geometry,
calculus, differential equations, statistics, matrices, etc. etc.
these will only get you to nowhere... the length of the encrypted code
I've shown above is NOT the same in length of the actual message or
the secret key just to let you know and applying your mathematics to
dig any connection is hopeless.... The world is now manipulated by
high-powered computer with state of the art programming dude! The
great cryptography oracle Alan Turing of Bletchley Park has long been
dead.

> >> Don't go WOW! though - this is full of holes, and while a single short
> >> ciphertext may not be breakable, longer ones *will* be.
> >> It isn't safe or secure.
> >- How'd you know? With due respect, are you a programmer? Are you
> >familiar at least the latest .net technology framework? me, I'm not.

> Moreover, you apparently don't understand why that's irrelevant.
> Cryptanalysis isn't programming, it's mathematics.

- Computational Mathematics to be exact sir. Although classical
mathematics is the basic foundation, this has now been integrated to
various computer techniques i.e. the power of computer programming
(computer science). I think you're still living with paper and pen
dude - that's a disaster to modern cryptography.

> >> Also, I don't see anything which limits reuse of a keyfile and password
> >> - breaking a pair of ciphertexts which use the same XOR key is trivial.

> >- But IOTP is different in many ways dude.

> Name five.

- Just look at the website dude, hiddentools.com but please don't
think of the concept of the classic perfect randomness at this point
in time so you can free yourself from the legacy of "unicity
distance".

> >> So yes, it's BS.

> >- No it's not, othewise prove it.

> It doesn't work like that. The onus is on you to provide a proof (in the
> mathematical sense) of security.

- The proof has been delivered... only need to be digested according
to todays technology and well
understood by the reader.

> --

- John Springfield

From: Richard Herring on
In message
<1aa4e571-9edb-4977-8200-67d4aba4e363(a)k19g2000yqc.googlegroups.com>,
john <penetratorv(a)yahoo.com> writes
>>
>> Does the phrase "unicity distance" mean anything to you?
>
>- To be honest with you dude "unicity distance" is now meaningless
>IMHO..

I'll take that as a "no". The value of YHO is becoming clearer with
every sentence you utter.

> though it has been the foundation of early cryptography - its
>now the thing of the past - getting possibilities is almost infinite -

ROFL. That's _why_ you need a long enough sequence of plaintext to
verify your hypothesis.

>you can rumble your arithmetic, algebra, trigonometry, geometry,
>calculus, differential equations, statistics, matrices, etc. etc.
>these will only get you to nowhere... the length of the encrypted code
>I've shown above is NOT the same in length of the actual message or
>the secret key just to let you know and applying your mathematics to
>dig any connection is hopeless.... The world is now manipulated by
>high-powered computer with state of the art programming dude!

Granny. Eggs. Suck.

> The
>great cryptography oracle Alan Turing of Bletchley Park has long been
>dead.
>
>
>> >> Don't go WOW! though - this is full of holes, and while a single short
>> >> ciphertext may not be breakable, longer ones *will* be.
>> >> It isn't safe or secure.
>> >- How'd you know? With due respect, are you a programmer? Are you
>> >familiar at least the latest .net technology framework? me, I'm not.
>
>> Moreover, you apparently don't understand why that's irrelevant.
>> Cryptanalysis isn't programming, it's mathematics.
>>
>- Computational Mathematics to be exact sir. Although classical
>mathematics is the basic foundation, this has now been integrated to
>various computer techniques i.e. the power of computer programming
>(computer science).

Word salad.

> I think you're still living with paper and pen
>dude

Since you have no idea what I do, your opinion is worthless. Again.

[...]

>> >- But IOTP is different in many ways dude.
>>
>> Name five.
>>
>- Just look at the website dude, hiddentools.com

If that's all it takes, why don't _you_ list them here?

[...]
>>
>> It doesn't work like that. The onus is on you to provide a proof (in the
>> mathematical sense) of security.
>
>- The proof has been delivered

Yeah, right. Where?

>but need to be digested and well understood by the reader.

Starting to sound like Adacrypt. Are you related?

Keep digging.
--
Richard Herring
From: john on
Richard, before I forget ---- "It seems that you are already
captivated with Shannon's Principle. It's time to free yourself dude!
Wake up, it's 2010... Bletchley Park is now a museum! We are already
living in the rapidly advancing
Computer Age. When you say that "The key is not random therefore it is
not secure", as if you were saying "It is not a helicopter, therefore,
it cannot fly..." Take it from me dude, "clinging to Shannon's
Principle is very disastrous to the world of cryptography as it
prevents advancements". The Infinite One-Time Pad is the most advanced
cryptography software I've ever seen so far - only for advanced people
though not for the vintage / war-time minded people.
From: john on
On Jan 26, 1:28 pm, Richard Herring <junk@[127.0.0.1]> wrote:
> In message
> <1aa4e571-9edb-4977-8200-67d4aba4e...(a)k19g2000yqc.googlegroups.com>,
> john <penetrat...(a)yahoo.com> writes
>
>
>
> >> Does the phrase "unicity distance" mean anything to you?

> I'll take that as a "no". The value of YHO is becoming clearer with
> every sentence you utter.
>
- ? ? ? ? ?

> > though it has been the foundation of early cryptography - its
> >now the thing of the past - getting possibilities is almost infinite -
>
> ROFL. That's _why_ you need a long enough sequence of plaintext to
> verify your hypothesis.

- Correct, do doubt with that dude but not the only way though - there
are loads of far better ways if you only unlock your mind from
Shannon's Principle and stay open-minded... QUALITY not QUANTITY dude!


> >you can rumble your arithmetic, algebra, trigonometry, geometry,...

> Granny. Eggs. Suck.

- A usual reply of a speechless loser.

>
> > I think you're still living with paper and pen
> >dude
>
> Since you have no idea what I do, your opinion is worthless. Again.
>
- I've no business on what you do dude and am not interested at all -
"living with paper and pen" means vintage way of dealing with things
(as far as modern cryptography is concerned) and I've based my
statement purely from our discussion - you lost your way again here
dude.

>
> >> It doesn't work like that. The onus is on you to provide a proof (in the
> >> mathematical sense) of security.
>
> >- The proof has been delivered
>
> Yeah, right. Where?

- I can't get what you really want now dude, are you after the
security skeleton? Don't ask me then as I know nothing of the
construction just the result which matters to me - ask the developer
instead, but I don't think they'll tell you that - it's a matter of
being a trade secret I guess... but it's worth trying...


> >but need to be digested and well understood by the reader.
>
> Starting to sound like Adacrypt. Are you related?
>
> Keep digging.

- I wish I were.... yeah! keep digging...

> --
- John Springfield

From: john on
On Jan 26, 1:28 pm, Richard Herring <junk@[127.0.0.1]> wrote:

> In message
> <1aa4e571-9edb-4977-8200-67d4aba4e...(a)k19g2000yqc.googlegroups.com>,
> john <penetrat...(a)yahoo.com> writes

> >> Does the phrase "unicity distance" mean anything to you?
> I'll take that as a "no". The value of YHO is becoming clearer with
> every sentence you utter.

- ? ? ? ? ?

> > though it has been the foundation of early cryptography - its
> >now the thing of the past - getting possibilities is almost infinite -

> ROFL. That's _why_ you need a long enough sequence of plaintext to
> verify your hypothesis.

- Correct, no doubt with that dude but not the only way though - there
are loads of far better ways if you only unlock your mind from
Shannon's Principle and stay open-minded... QUALITY not QUANTITY dude!

> >you can rumble your arithmetic, algebra, trigonometry, geometry,...
> Granny. Eggs. Suck.

- A usual reply of a speechless loser.

> > I think you're still living with paper and pen
> >dude

> Since you have no idea what I do, your opinion is worthless. Again.

- I've no business on what you do dude and am not interested at all -
"living with paper and pen" means vintage way of dealing with things
(as far as modern cryptography is concerned) and I've based my
statement purely from our discussion - you lost your way again here
dude.

> >> It doesn't work like that. The onus is on you to provide a proof (in the
> >> mathematical sense) of security.

> >- The proof has been delivered

> Yeah, right. Where?

- I can't get what you really want now dude, are you after the
security skeleton? Don't ask me then as I know nothing of the
construction just the result which matters to me - ask the developer
instead, but I don't think they'll tell you that - it's a matter of
being a trade secret I guess... but it's worth trying...

> >but need to be digested and well understood by the reader.

> Starting to sound like Adacrypt. Are you related?

> Keep digging.

- I wish I were.... yeah! keep digging...

> --

- John Springfield
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Prev: Certificates
Next: Q: Kerchhoffs' principle