From: Paulo Marques on
vanessavertudez(a)yahoo.com wrote:
> On Jan 26, 11:59 pm, vanessavertu...(a)yahoo.com wrote:
>> On Jan 26, 11:04 pm, Paulo Marques <pmarq...(a)grupopie.com> wrote:

>>> "'thinking outside the box' works better if I know what's inside the box."

>> There are cases where you don't need to see what's inside the box.
>> For example, it is plane to see that SR-71 Blackbird is faster than
>> Boeing X-43.
>> Do we still need to see the components used, designs, etc to believe
>> it is.
>> Sometimes, logical judgement is enough. Digging the internals is just
>> a secondary.

That was just a signature that my email client selected at random. I
left it intact, because it sort of fitted the thread. In your own
example: yes, you can see that the plane is faster, but you can't really
see why. So knowing what's inside really works _better_.

> As I understand, John based his judgement of the matter on the
> logical point of view. I also tried the software Infinite One-Time Pad
> and logically, it is unbreakable.

And a lot of people have explained why is logic is flawed, but is
replies to that have been similar to:

"you know dude, "unicity distance" is dead dude, and that algebra and
mathematics are soooo square dude, you need to understand the new
extreme programming concepts that go beyond mathematics, dude... oh
yeah, and some files are really big, dude"

Now listen to that and tell me if you don't see a bong in there
somewhere? ;)

--
Paulo Marques - www.grupopie.com

"Who is general Failure and why is he reading my disk?"
From: Richard Herring on
In message
<477ebf49-6d2f-4477-84b4-c192c5f4d4eb(a)b10g2000yqa.googlegroups.com>,
john <penetratorv(a)yahoo.com> writes
>Richard, before I forget ---- "It seems that you are already
>captivated with Shannon's Principle.

Hey, it's *your* favourite crypto program that claims to rely on
Shannon:

"Infinite One-Time Pad (IO-TP) is super secure text encryption and
decryption software. It implements the concept of the true One-Time Pad
to produce a ciphertext that is unbreakable."

[...].

> It's time to free yourself dude!
>Wake up, it's 2010... Bletchley Park is now a museum! We are already
>living in the rapidly advancing
>Computer Age. When you say that "The key is not random therefore it is
>not secure",

I'm sure you can remind me where I said that? A Message-ID will do.

> as if you were saying "It is not a helicopter, therefore,
>it cannot fly..." Take it from me dude, "clinging to Shannon's
>Principle is very disastrous to the world of cryptography as it
>prevents advancements".

Indeed. That's why most practical cryptosystems don't implement perfect
secrecy, and indeed Shannon took care to distinguish between "perfect
secrecy", "ideal secrecy" and "practical secrecy" .


>The Infinite One-Time Pad is the most advanced
>cryptography software I've ever seen so far

"Advanced"? The very (mis-)use of the phrase "One-Time Pad" proclaims
that it's based on that very principle you keep deriding!.

>- only for advanced people
>though not for the vintage / war-time minded people.

--
Richard Herring
From: vanessavertudez on
On Jan 27, 12:34 am, Richard Herring <junk@[127.0.0.1]> wrote:
> In message
> <477ebf49-6d2f-4477-84b4-c192c5f4d...(a)b10g2000yqa.googlegroups.com>,
> john <penetrat...(a)yahoo.com> writes
>
> >Richard, before I forget ---- "It seems that you are already
> >captivated with Shannon's Principle.
>
> Hey, it's *your* favourite crypto program that claims to rely on
> Shannon:
>
> "Infinite One-Time Pad (IO-TP) is super secure text encryption and
> decryption software. It implements the concept of the true One-Time Pad
> to  produce a ciphertext that is unbreakable."
>
> [...].
>
> > It's time to free yourself dude!
> >Wake up, it's 2010... Bletchley Park is now a museum! We are already
> >living in the rapidly advancing
> >Computer Age. When you say that "The key is not random therefore it is
> >not secure",
>
> I'm sure you can remind me where I said that? A Message-ID will do.
>
> > as if you were saying "It is not a helicopter, therefore,
> >it cannot fly..." Take it from me dude, "clinging to Shannon's
> >Principle is very disastrous to the world of cryptography as it
> >prevents advancements".
>
> Indeed. That's why most practical cryptosystems don't implement perfect
> secrecy, and indeed Shannon took care to distinguish between "perfect
> secrecy", "ideal secrecy" and "practical secrecy" .
>
> >The Infinite One-Time Pad is the most advanced
> >cryptography software I've ever seen so far
>
> "Advanced"? The very (mis-)use of the phrase "One-Time Pad" proclaims
> that it's based on that very principle you keep deriding!.
>
> >- only for advanced people
> >though not for the vintage / war-time minded people.
>
> --
> Richard Herring

Okay, I will discuss here how Infinite One-Time Pad works according
to
available references. This may not be accurate as I may be missing
something but generally it goes like this.

The PLAIN text is compressed and encoded using series of algorithms.
Let's now call it "Transformed Text". Now, the key is extracted from
a
secret file of your choice and again it is filtered and encoded and
you
have a chance to insert any word or characters at any location to
modify
it further. If you type a password, each character of the password
re-encodes the modified key. Let's call the result as "Transformed
Key".
Finally, the "Transformed Key" is applied to the "Transformed Text".

I CHALLENGE EVERYONE to present a solution on how to attack
the ciphertext. You can find available "cryptanalysis" techniques here
http://en.wikipedia.org/wiki/Cryptanalysis. Study the attacks then
show how it could be used against Infinite One-Time Pad's
ciphertext at least logically.
From: Paulo Marques on
vanessavertudez(a)yahoo.com wrote:
> [...]
> Okay, I will discuss here how Infinite One-Time Pad works according
> to available references. This may not be accurate as I may be missing
> something but generally it goes like this.

Since you seem to be honest and not trolling, I'll try to explain why
this doesn't work.

> The PLAIN text is compressed and encoded using series of algorithms.
> Let's now call it "Transformed Text".

This transformation doesn't involve any kind of encryption with a secret
key. So, if an attacker want to test some key, it can try it and run the
reverse transformation over the obtained text and see if that works.

In fact, this transformed text can be even easier to attack than the
original text. Let me give you an example: imagine that your
transformation consisted of Zip'ing the files you want to encrypt. Now
the attacker knows that the "transformed text" always start with the
string "PK" (and other zip structure details) and doesn't even need to
run the reverse transformation to find the actual plaintext to know if a
key works or not.

> Now, the key is extracted from a secret file of your choice and
> again it is filtered and encoded

The point here is key distribution: if you need to send your encrypted
file to someone you need to also send the "secret file". At this point,
is not secret anymore.

> and you have a chance to insert any word or characters at any location
> to modify it further. If you type a password, each character of the
password
> re-encodes the modified key. Let's call the result as "Transformed
> Key".

This is not very different from key strengthening. It is just slightly
worse than any other algorithm out there.

> Finally, the "Transformed Key" is applied to the "Transformed Text".

Duh,

> I CHALLENGE EVERYONE to present a solution on how to attack
> the ciphertext. You can find available "cryptanalysis" techniques here
> http://en.wikipedia.org/wiki/Cryptanalysis. Study the attacks then
> show how it could be used against Infinite One-Time Pad's
> ciphertext at least logically.

You're talking to the crowd that wrote that wikipedia page, so you get
no points for insulting everyone.

If you compare that algorithm with something like GnuPG (for instance),
you'll notice how key distribution is much easier and secure with GnuPG
(and free).

--
Paulo Marques - www.grupopie.com

"Feed the hungry, save the whales, free the mallocs!"
From: rossum on
On Tue, 26 Jan 2010 04:39:30 -0800 (PST), john <penetratorv(a)yahoo.com>
wrote:

>- To be honest with you dude "unicity distance" is now meaningless
>IMHO..
Fine, then please crack my own unbreakable code. Here is a sample of
cyphertext for you: 5A

That is a single byte of cyphertext expressed in hex. Since unicity
is "meaningless" you should be able to decrypt it.

rossum

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Prev: Certificates
Next: Q: Kerchhoffs' principle