Prev: CFP Applied Computing 2010: submissions until 28 May 2010
Next: On the general benefits of introducing dynamics into encryption processing
From: Maaartin on 1 May 2010 07:53 On Apr 30, 10:21 am, adacrypt <austin.oby...(a)hotmail.com> wrote: > Encapsulation cryptography means conventional ciphers in which the > plaintext is embedded within the ciphertext in some shape or form and > is protected by a key(s) that later enables the inversion of the > ciphertext back into the original plaintext. There is no unbreakable > cipher in existence and it can be demonstrated that it is impossible > to write one ever. There's no theoretically unbreakable cipher when the key length is shorter than the plaintext, whatever you do. There are a lot of efficient practically unbreakable ciphers with key length of 128 bits or more. > The cost of running this latter type of cryptography is enormous in > terms of the professional user-assistance that must be given to it by > graduate keyboard operators all over the world. Where can I study for keyboard operator? Is it possible to make a PhD in this subject? :D In fact, any BFU can use HTTPS or VPN or GPG, the only requirement is not to give her password to everybody. You're right, it's enormously hard for them and they could use some lessons. > The burning question is Why continue with this latter when something > far better i.e. unbreakable mark-up scripting ciphers, operable by non- > specialist everyday office workers is to hand ? - adacrypt On Apr 30, 11:15 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote: > adacrypt wrote: > > > Mark-up cryptography means the mutual database technology ...[snip] > > I doubt that "mutual databse" is a commonly used/understood term in the > field of database theory. Is that simply a huge codebook in the sense > of classical crypto? Maybe a codebook, maybe a secret key, for sure not a good idea to use another word for something already known. However, the problem of transporting the database to the receiver remains. Maybe we could ask the Oracle guys? :D On Apr 30, 7:07 pm, adacrypt <austin.oby...(a)hotmail.com> wrote: > No , it is not a huge codebook in any way - it is instead comprised of > several large (say about a nominal 8000 elements each) arrays of > mathematical integer operands that are called by a computer to enable I'm really curious how non-mathematical integers may look like.
From: Mok-Kong Shen on 1 May 2010 08:00 adacrypt wrote: > I have no idea what the classical use of code books is about but all > my instintcts rail against it as being weak cryptography ? An example of a code book used in practice is: http://www.cix.co.uk/~klockstone/codebook.htm M. K. Shen
From: Bryan on 1 May 2010 16:12 Gordon Burditt observed: > The primary advantage of a "mutual database" is that it fools > adacrypt into thinking that his Too Many Time Pad is a One Time > Pad. Adacrypt has transcended cryptography as we know it. His messages are undecipherable even in cleartext. -- --Bryan
From: Bruce Stephens on 1 May 2010 16:38 adacrypt <austin.obyrne(a)hotmail.com> writes: [...] > The cost of running this latter type of cryptography is enormous in > terms of the professional user-assistance that must be given to it by > graduate keyboard operators all over the world. Can you give some estimates? For example, suppose a small company wants to send some Excel spreadsheet (sales projections, say) securely to a distant office once a week. They do that by encrypted email. (You've never mentioned VPNs which would be a likely alternative mechanism, so let's ignore that possibility and assume the communication is via email.) What do you think the above scenario involves now and why would graduate keyboard operators be needed? How would it work with whatever you system is? [...]
From: Non scrivetemi on 1 May 2010 19:56
> For example, suppose a small company wants to send some Excel > spreadsheet (sales projections, say) securely to a distant office once a > week. They do that by encrypted email. (You've never mentioned VPNs > which would be a likely alternative mechanism, so let's ignore that > possibility and assume the communication is via email.) > > What do you think the above scenario involves now and why would graduate > keyboard operators be needed? How would it work with whatever you > system is? S/MIME. Trivial, even Outlook supports it. If your people are too stupid to use that, close your company and sit on the beach. |