Prev: CFP Applied Computing 2010: submissions until 28 May 2010
Next: On the general benefits of introducing dynamics into encryption processing
From: adacrypt on 30 Apr 2010 04:21 Mark-up cryptography means the mutual database technology that I am promoting in which the ciphertext is virtually a scripting language that indexes the arrays of the mutual databases. There are three cipher implementations up and running with mathematical proof of this crypto-type to hand. Encapsulation cryptography means conventional ciphers in which the plaintext is embedded within the ciphertext in some shape or form and is protected by a key(s) that later enables the inversion of the ciphertext back into the original plaintext. There is no unbreakable cipher in existence and it can be demonstrated that it is impossible to write one ever. The cost of running this latter type of cryptography is enormous in terms of the professional user-assistance that must be given to it by graduate keyboard operators all over the world. The burning question is Why continue with this latter when something far better i.e. unbreakable mark-up scripting ciphers, operable by non- specialist everyday office workers is to hand ? - adacrypt
From: Mok-Kong Shen on 30 Apr 2010 05:15 adacrypt wrote: > > Mark-up cryptography means the mutual database technology ...[snip] I doubt that "mutual databse" is a commonly used/understood term in the field of database theory. Is that simply a huge codebook in the sense of classical crypto? M. K. Shen
From: adacrypt on 30 Apr 2010 08:23 On Apr 30, 10:15 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote: > adacrypt wrote: > > > Mark-up cryptography means the mutual database technology ...[snip] > > I doubt that "mutual databse" is a commonly used/understood term in the > field of database theory. Is that simply a huge codebook in the sense > of classical crypto? > > M. K. Shen Hi, In this instance as applied to cryptography it means that Bob has an exact copy of the arrays of data, the scrambling parameters, the slice start points for arrays that Alice has used at her end to compile a particular encrypted message. Collectively this is a database and because it is common to both entities it is adjectively called a mutual database. It is used over and over again in a different permutation each time but is always mutually exact. - Cheers - adacrypt
From: Mok-Kong Shen on 30 Apr 2010 10:28 adacrypt wrote: > Mok-Kong Shen wrote: >> adacrypt wrote: >> >>> Mark-up cryptography means the mutual database technology ...[snip] >> >> I doubt that "mutual databse" is a commonly used/understood term in the >> field of database theory. Is that simply a huge codebook in the sense >> of classical crypto? > Hi, > > In this instance as applied to cryptography it means that Bob has an > exact copy of the arrays of data, the scrambling parameters, the slice > start points for arrays that Alice has used at her end to compile a > particular encrypted message. Collectively this is a database and > because it is common to both entities it is adjectively called a > mutual database. It is used over and over again in a different > permutation each time but is always mutually exact. - Cheers - You didn't answer my question. M. K. Shen
From: adacrypt on 30 Apr 2010 13:07
On Apr 30, 3:28 pm, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote: > adacrypt wrote: > > Mok-Kong Shen wrote: > >> adacrypt wrote: > > >>> Mark-up cryptography means the mutual database technology ...[snip] > > >> I doubt that "mutual databse" is a commonly used/understood term in the > >> field of database theory. Is that simply a huge codebook in the sense > >> of classical crypto? > > Hi, > > > In this instance as applied to cryptography it means that Bob has an > > exact copy of the arrays of data, the scrambling parameters, the slice > > start points for arrays that Alice has used at her end to compile a > > particular encrypted message. Collectively this is a database and > > because it is common to both entities it is adjectively called a > > mutual database. It is used over and over again in a different > > permutation each time but is always mutually exact. - Cheers - > > You didn't answer my question. > > M. K. Shen- Hide quoted text - > > - Show quoted text - No , it is not a huge codebook in any way - it is instead comprised of several large (say about a nominal 8000 elements each) arrays of mathematical integer operands that are called by a computer to enable the one-way mathematical functions of this cryptography to proceed - come again if you are still not clear. Being merely a very large code book is unthinkable to me - that would be far too facile and vulnerable for say national security - unthinkable ! - this cryptography is totally number-theoretic and symmetrically function-based rather than mere mapping of code points - the algorithms are very mathematically prodigious - adacrypt. |