Prev: Desiderata of a "hypothetical" PL extension
Next: unix encryption mcrypt_encrypt mcrypt_decrypt
From: Dave -Turner on 27 Jun 2010 10:01 Why the f not just post it in plaintext? It's public domain info, and is only weakly protected even though it doesn't need protection - all this does is force the reader to waste extra time. Seems a bit pointless to me.
From: Globemaker on 29 Jun 2010 06:36 adacrypt said: > One way or another this launching of "Popular Cryptography Magazine" > is a turning point for the good in crypto publications in my view - I > just hope that they will change the goal posts - I reckon if they > worked on a policy of publishing by meritorios invitation it would > become such a coveted prize that it would fill a much needed niche > between say the American Mathematical Society and sci crypt. - > adacry During these early stages of evaluating your Vector Cipher 2, I am focussing on two aspects for Popular Cryptography Magazine: I cannot find a place in your software to enter a key of all zeros. When I tried to encrypt a file with 24 megabytes of ASCII information, the ciphertext was only 3 kilobytes long. Do you, adacrypt, have any comment on those two issues? Are these the right programs to be evaluating? real_time_encryption_program_mark_2.exe batch_encryption_program_mark_2.exe general_encryption_program_mark_2.exe general_decryption_program_mark_2.exe
From: Globemaker on 29 Jun 2010 06:47 On Jun 28, 8:46 am, David Eather <eat...(a)tpg.com.au> wrote: > You and everyone else use cryptography almost every day, probably > several times a day you/they aren't even aware of the fact - that's how > unobtrusive real cryptography is. It is automated to be unobtrusive so unskilled people can benefit. That automation disallows anyone to enter the key of all zeros, except in rare instantiations. > > If you wanted to review something useful try PGP or TrueCrypt. I tried out TrueCrypt. It disallows me to enter the key of all zeros. > >I know > > from my experience how difficult it is for a Master of Science to > > enter the "all zeros key" and to decrypt a stranger's file. > > There are 8 year olds who use cryptography daily. Most don't seem to > need a Master's. Do you see a difference between what you do and think > and what is done in practice? Yes, I notice that the automated authentication is about as trustworthy as on-line slot machines.
From: adacrypt on 29 Jun 2010 07:39 On Jun 29, 11:36 am, Globemaker <alanfolms...(a)cabanova.com> wrote: > adacrypt said: > > > One way or another this launching of "Popular Cryptography Magazine" > > is a turning point for the good in crypto publications in my view - I > > just hope that they will change the goal posts - I reckon if they > > worked on a policy of publishing by meritorios invitation it would > > become such a coveted prize that it would fill a much needed niche > > between say the American Mathematical Society and sci crypt. - > > adacry > > During these early stages of evaluating your Vector Cipher 2, I am > focussing on two aspects for Popular Cryptography Magazine: > I cannot find a place in your software to enter a key of all zeros. > When I tried to encrypt a file with 24 megabytes of ASCII information, > the ciphertext was only 3 kilobytes long. > Do you, adacrypt, have any comment on those two issues? > > Are these the right programs to be evaluating? > real_time_encryption_program_mark_2.exe > batch_encryption_program_mark_2.exe > general_encryption_program_mark_2.exe > general_decryption_program_mark_2.exe Hi, >Are these the right programs to be evaluating? >real_time_encryption_program_mark_2.exe >batch_encryption_program_mark_2.exe >general_encryption_program_mark_2.exe Yes, these are the right programs alright. That version does not display any of the internal computations at runtime that Mark_0 does - it is a working version - it also an exact copy of Mark_1 I have no idea what a key of all zeros that you mention is and there is no accomodation in my source code for it - I suspect my cipher is rejecting something it is not intended to do - it may sound small- minded but frankly the only thing I want to understand is security of information that is encrypted by one of the two cipher types (sporadic mapping to integer points in space) - that I am promoting - I want to cooperate with you and suggest that if you email me a file of plaintext - I will encrypt it at my end and compare results - remember I work in denary all the time - no binary ever - except inside my computer as machine code - hope to hear from - cheers - Adacrypt
From: adacrypt on 29 Jun 2010 07:43 On Jun 29, 11:36 am, Globemaker <alanfolms...(a)cabanova.com> wrote: > adacrypt said: > > > One way or another this launching of "Popular Cryptography Magazine" > > is a turning point for the good in crypto publications in my view - I > > just hope that they will change the goal posts - I reckon if they > > worked on a policy of publishing by meritorios invitation it would > > become such a coveted prize that it would fill a much needed niche > > between say the American Mathematical Society and sci crypt. - > > adacry > > During these early stages of evaluating your Vector Cipher 2, I am > focussing on two aspects for Popular Cryptography Magazine: > I cannot find a place in your software to enter a key of all zeros. > When I tried to encrypt a file with 24 megabytes of ASCII information, > the ciphertext was only 3 kilobytes long. > Do you, adacrypt, have any comment on those two issues? > > Are these the right programs to be evaluating? > real_time_encryption_program_mark_2.exe > batch_encryption_program_mark_2.exe > general_encryption_program_mark_2.exe > general_decryption_program_mark_2.exe Hi again , Are you able to encrypt and decrypt the test files of plaintext that are included in the directory (folder) of Vector Cipher_2 ok ? - adacrypt
|
Next
|
Last
Pages: 1 2 3 4 5 Prev: Desiderata of a "hypothetical" PL extension Next: unix encryption mcrypt_encrypt mcrypt_decrypt |