From: Maaartin on
On Apr 30, 10:21 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
> Encapsulation cryptography means conventional ciphers in which the
> plaintext is embedded within the ciphertext in some shape or form and
> is protected by a key(s) that later enables the inversion of the
> ciphertext back into the original plaintext. There is no unbreakable
> cipher in existence and it can be demonstrated that it is impossible
> to write one ever.

There's no theoretically unbreakable cipher when the key length is
shorter than the plaintext, whatever you do. There are a lot of
efficient practically unbreakable ciphers with key length of 128 bits
or more.

> The cost of running this latter type of cryptography is enormous in
> terms of the professional user-assistance that must be given to it by
> graduate keyboard operators all over the world.

Where can I study for keyboard operator? Is it possible to make a PhD
in this subject? :D

In fact, any BFU can use HTTPS or VPN or GPG, the only requirement is
not to give her password to everybody. You're right, it's enormously
hard for them and they could use some lessons.


> The burning question is “Why continue with this latter when something
> far better i.e. unbreakable mark-up scripting ciphers, operable by non-
> specialist everyday office workers is to hand” ? - adacrypt


On Apr 30, 11:15 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
> adacrypt wrote:
>
> > Mark-up cryptography means the mutual database technology ...[snip]
>
> I doubt that "mutual databse" is a commonly used/understood term in the
> field of database theory. Is that simply a huge codebook in the sense
> of classical crypto?

Maybe a codebook, maybe a secret key, for sure not a good idea to use
another word for something already known. However, the problem of
transporting the database to the receiver remains. Maybe we could ask
the Oracle guys? :D


On Apr 30, 7:07 pm, adacrypt <austin.oby...(a)hotmail.com> wrote:
> No , it is not a huge codebook in any way - it is instead comprised of
> several large (say about a nominal 8000 elements each) arrays of
> mathematical integer operands that are called by a computer to enable

I'm really curious how non-mathematical integers may look like.
From: Mok-Kong Shen on
adacrypt wrote:

> I have no idea what the classical use of code books is about but all
> my instintcts rail against it as being weak cryptography ?

An example of a code book used in practice is:

http://www.cix.co.uk/~klockstone/codebook.htm

M. K. Shen
From: Bryan on
Gordon Burditt observed:
> The primary advantage of a "mutual database" is that it fools
> adacrypt into thinking that his Too Many Time Pad is a One Time
> Pad.

Adacrypt has transcended cryptography as we know it. His messages are
undecipherable even in cleartext.

--
--Bryan
From: Bruce Stephens on
adacrypt <austin.obyrne(a)hotmail.com> writes:

[...]

> The cost of running this latter type of cryptography is enormous in
> terms of the professional user-assistance that must be given to it by
> graduate keyboard operators all over the world.

Can you give some estimates?

For example, suppose a small company wants to send some Excel
spreadsheet (sales projections, say) securely to a distant office once a
week. They do that by encrypted email. (You've never mentioned VPNs
which would be a likely alternative mechanism, so let's ignore that
possibility and assume the communication is via email.)

What do you think the above scenario involves now and why would graduate
keyboard operators be needed? How would it work with whatever you
system is?

[...]

From: Non scrivetemi on
> For example, suppose a small company wants to send some Excel
> spreadsheet (sales projections, say) securely to a distant office once a
> week. They do that by encrypted email. (You've never mentioned VPNs
> which would be a likely alternative mechanism, so let's ignore that
> possibility and assume the communication is via email.)
>
> What do you think the above scenario involves now and why would graduate
> keyboard operators be needed? How would it work with whatever you
> system is?

S/MIME. Trivial, even Outlook supports it. If your people are too stupid to
use that, close your company and sit on the beach.