From: Pubkeybreaker on
On Mar 9, 9:55 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
> On Mar 9, 1:25 pm, Phoenix <ribeiroa...(a)gmail.com> wrote:
>
> > My question.
>
> > Why you did not compete at NIST new cryptographic hash Algorithm
> > Competition?
>
> Hi,
> To be perfectly honest I haved not taken the trouble to pursue the
> procedure for submissions to NIST since I know almost nothing about
> them and frankly I baulk at the prospect of being patronised by those
> good people.  

Almost, but no.

The correct way for adacrypt to have punctuated the previous sentence
would
have been for him to place a period after the word "nothing".
From: Pubkeybreaker on
On Mar 9, 10:07 am, Tom St Denis <t...(a)iahu.ca> wrote:
> On Mar 9, 9:55 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
>
>
>
>
>
> > On Mar 9, 1:25 pm, Phoenix <ribeiroa...(a)gmail.com> wrote:
>
> > > My question.
>
> > > Why you did not compete at NIST new cryptographic hash Algorithm
> > > Competition?
>
> > Hi,
> > To be perfectly honest I haved not taken the trouble to pursue the
> > procedure for submissions to NIST since I know almost nothing about
> > them and frankly I baulk at the prospect of being patronised by those
> > good people.  The same goes for the IACR (International Association
> > for Cryptologic Research) - I detest their reviewers and would not
> > expect honest treatment from what I call an intransigent dishonest
> > establishment - ditto for the mathematical societies although I am a
> > member of one of these but only in a passive way.
> > ** Sci crypt research would not publish my recent submissions** - I
> > found that particularly insulting.
>
> So just to be clear it's never occurred to you that your stuff is not
> accepted by mainstream scientists because it's garbage?


What do you have against garbage? adacrypt's babblings are not good
enough
to qualify as garbage.
From: J.D. on
On Mar 9, 8:25 am, Phoenix <ribeiroa...(a)gmail.com> wrote:
> My question.
>
> Why you did not compete at NIST new cryptographic hash Algorithm
> Competition?

The difference between a crank and a snake-oil salesman is that a
crank is under the delusion that he is right, while a snake-oil
salesman wants _you_ to be under the delusion that he is right. Snake-
oil salesmen do not waste their time and effort trying to market their
bullshit to people who are eminently qualified to detect it as such.
From: Maaartin on
On Mar 9, 4:45 pm, "J.D." <degolyer...(a)yahoo.com> wrote:
> On Mar 9, 8:25 am, Phoenix <ribeiroa...(a)gmail.com> wrote:
>
> > My question.
>
> > Why you did not compete at NIST new cryptographic hash Algorithm
> > Competition?
>
> The difference between a crank and a snake-oil salesman is that a
> crank is under the delusion that he is right, while a snake-oil
> salesman wants _you_ to be under the delusion that he is right.  Snake-
> oil salesmen do not waste their time and effort trying to market their
> bullshit to people who are eminently qualified to detect it as such.

So do you REALLY mean, he is no crank???
From: WTShaw on
On Mar 9, 4:24 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
> .
> I am promoting two new forms of cryptography i.e. ‘vector
> cryptography’ and ‘scalable key cryptography’ from my two websites
> calledhttp://www.adacrypt.comandhttp://www.scalarcryptography.co.uk
> respectively.
>
> Both of these new crypto-types are drawing very great interest judging
> from the visitors to the sites which numbers more than 153,000 so far
> and from the many communications that I am getting also.
>
> Both crypto types use very simple mapping and mutual database
> technology in which Bob becomes Alice’s server and Alice the client in
> a closed-circuit crypto- system that is privy to themselves alone.
> The cipher text is no more than ‘mark-up’ of a special kind.
>
> The point I wish to make here is that future cryptography will
> certainly not use any extracts from Claude Shannon’s information
> theory and least of all ‘unicity’ theory.
>
> I am an admirer of Claude Shannon and he is pictured on the home page
> of both of my sites but I want to make it clear that the party is over
> for all complexity – theoretic cryptography that used operand-embedded
> cipher text in the past and indeed it is time for modern researchers
> to start getting real about this fact.
>
> Pulling old role-models out of retirement in a recent posting and
> pretending that there is still worthwhile discussion is a lie and is
> confusing to any newbie who will be sent the wrong way by believing he
> is being given the latest information when in fact that is truly
> redundant information and is worse than useless.
>
> The handbook called “Handbook of Applied Cryptography” is rapidly
> becoming obsolete also for the reason that only the first 20 pages
> that are generally applicable to any part of all future cryptography,
> is now the only part of the book that is worth reading – the rest of
> this once great book is now defunct because it relates to defunct
> algorithms.
>
> None of these algorithms produced the ultimate high class of
> theoretically unbreakable ciphers so badly needed now by national
> governments - my cryptography does - adacrypt
> .

The devil is in the details. The problem with Shannon is not viewing
him as a humble contributer, reading less of him than more, He is both
relevant and irrelevant and understanding why is important.

As long as government have a hammer, they tend to reduce all arguments
to nails, delicate processes notwithstanding.