From: WTShaw on
On Mar 9, 9:15 am, Noob <r...(a)127.0.0.1> wrote:
> Tom,
>
> Did you let the kooks and cranks out of your kill file?
>
> Regards.

Why does Noob rhyme with Boob?
From: WTShaw on
On Mar 9, 11:13 am, Maaartin <grajc...(a)seznam.cz> wrote:
> On Mar 9, 4:45 pm, "J.D." <degolyer...(a)yahoo.com> wrote:
>
> > On Mar 9, 8:25 am, Phoenix <ribeiroa...(a)gmail.com> wrote:
>
> > > My question.
>
> > > Why you did not compete at NIST new cryptographic hash Algorithm
> > > Competition?
>
> > The difference between a crank and a snake-oil salesman is that a
> > crank is under the delusion that he is right, while a snake-oil
> > salesman wants _you_ to be under the delusion that he is right.  Snake-
> > oil salesmen do not waste their time and effort trying to market their
> > bullshit to people who are eminently qualified to detect it as such.
>
> So do you REALLY mean, he is no crank???

There are usually more than two categories. It's all or nothing or
binary thinking to oversimplify for political convenience.
From: Gordon Burditt on
>I am promoting two new forms of cryptography i.e. �vector
>cryptography� and �scalable key cryptography� from my two websites
>called http://www.adacrypt.com and http://www.scalarcryptography.co.uk
>respectively.

If you're promoting it, then you're not prepared to evaluate it
honestly. "marketing" == "lies".

Anything you represent as vectors can also be represented as scalars.
Anything that can be represented as scalars can be represented as
1-dimensional vectors. The calculations are the same either way.

>Both of these new crypto-types are drawing very great interest judging
>from the visitors to the sites which numbers more than 153,000 so far
>and from the many communications that I am getting also.

Don't make the mistake like JSH did in claiming that Google rankings
can be meaningfully used in a proof of correctness of the material
published. Remember, some of the material that gets high rankings
are jokes. Some people probably think your material is a joke.

>Both crypto types use very simple mapping and mutual database
>technology in which Bob becomes Alice�s server and Alice the client in
>a closed-circuit crypto- system that is privy to themselves alone.
>The cipher text is no more than �mark-up� of a special kind.

Then I suggest that you scrupulously avoid any use of the
following words in describing your cryptography: pad, time, one,
unbreakable, theoretically.

>The point I wish to make here is that future cryptography will
>certainly not use any extracts from Claude Shannon�s information
>theory and least of all �unicity� theory.

Then don't use terms which refer to information theory, including
pad, time, one, unbreakable, and theoretically.

I believe that future attempts to break cryptography by crackers
will use Shannon's information theory whether you want them to or
not.

Do you claim that information theory is *WRONG* or just old-fashioned?
If you claim it's *WRONG*, you certainly haven't clearly stated what
you think is wrong, much less presented a proof of it. If you think
it's old-fashioned, well, 2+2=4 is also old-fashioned, but it still works.

>I am an admirer of Claude Shannon and he is pictured on the home page
>of both of my sites but I want to make it clear that the party is over
>for all complexity � theoretic cryptography that used operand-embedded
>cipher text in the past and indeed it is time for modern researchers
>to start getting real about this fact.

>Pulling old role-models out of retirement in a recent posting and
>pretending that there is still worthwhile discussion is a lie and is
>confusing to any newbie who will be sent the wrong way by believing he
>is being given the latest information when in fact that is truly
>redundant information and is worse than useless.
>
>The handbook called �Handbook of Applied Cryptography� is rapidly
>becoming obsolete also for the reason that only the first 20 pages
>that are generally applicable to any part of all future cryptography,
>is now the only part of the book that is worth reading � the rest of
>this once great book is now defunct because it relates to defunct
>algorithms.

>None of these algorithms produced the ultimate high class of
>theoretically unbreakable ciphers so badly needed now by national
>governments - my cryptography does - adacrypt

You don't get to redefine "theoretically unbreakable".

From: amzoti on
On Mar 9, 7:17 am, Pubkeybreaker <pubkeybrea...(a)aol.com> wrote:
> On Mar 9, 9:55 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
>
> > On Mar 9, 1:25 pm, Phoenix <ribeiroa...(a)gmail.com> wrote:
>
> > > My question.
>
> > > Why you did not compete at NIST new cryptographic hash Algorithm
> > > Competition?
>
> > Hi,
> > To be perfectly honest I haved not taken the trouble to pursue the
> > procedure for submissions to NIST since I know almost nothing about
> > them and frankly I baulk at the prospect of being patronised by those
> > good people.  
>
> Almost, but no.
>
> The correct way for adacrypt to have punctuated the previous sentence
> would
> have been for him to place a period after the word "nothing".

:-)