From: Mok-Kong Shen on
Maaartin wrote:

> But having a fast perfectly secure PRNG you could simply xor it's
> output with the plaintext. Using an unsecure PRNG makes the Hill's
> scheme vulnarable again. And again, you need an expensive analysis of
> the cipher what is just what you wanted to avoid.

I don't yet understand your last sentence. If an n*n matrix is
used to process less than n^2 units (characters or computer words)
of text, there simply isn't possible to recover that matrix, if
the analyst has the plaintext and ciphertext available. Thus,
inferring the parameters of the PRNG would not be feasible in
my view.

M. K. Shen
From: Mok-Kong Shen on
biject wrote:

> A realitively easy scheme would be to use the XOR
> program I wrote years ago where the two files do not
> have to be the same length. One of the files could
> be the first part of a long key.
>
> When you XOR the two files then do some sort
> of bijective binary BWT on the result file.
> then do another XOR with a second different
> key file.
>
> Some day I will but a binary bijective BWT type of
> program on web since it is the fist stage of a simple
> bijective binary BWT type of compression program.

I am not intending to be negative, but you have been persuing
your 'bijective' project for a very very long time, if I don't
err, and I wonder that today you still write 'some day' above.
Since your program centers on compression, it would be fine
to first have it be carefully discussed by the compression
people in my view.

M. K. Shen
From: Mok-Kong Shen on
Mok-Kong Shen wrote:

> ...... as an alternative to applying sophisticated algorithms that
> require deep analysis in their design and much care in implementation,
> employ certain simple primitive procedures, using a much higher number
> of steps of operations to compensate for their inherent weakness with
> respect to the complex procedures underlying the sophisticated
> algorithms.

This includes also employing larger (than hitherto) block lengths
for the simple procedures and concatenations of them. (Concatenation
of a number of linear ones is obviously futile, since they are
equivalent to a single one. But I suppose one could profitably sandwich
a linear one of large block width between two layers of nonlinear ones
that consist of units of small block widths, if the linear one well
contributes to avalanche.)

M. K. Shen

From: Maaartin on
On Nov 14, 10:27 am, Mok-Kong Shen <mok-kong.s...(a)t-online.de> wrote:
> Maaartin wrote:
> > But having a fast perfectly secure PRNG you could simply xor it's
> > output with the plaintext. Using an unsecure PRNG makes the Hill's
> > scheme vulnarable again. And again, you need an expensive analysis of
> > the cipher what is just what you wanted to avoid.
>
> I don't yet understand your last sentence. If an n*n matrix is
> used to process less than n^2 units (characters or computer words)
> of text, there simply isn't possible to recover that matrix, if
> the analyst has the plaintext and ciphertext available. Thus,
> inferring the parameters of the PRNG would not be feasible in
> my view.

Maybe you can't recover the matrix, but surely you can learn a lot of
about it. Using this information you can break the scheme if the PRNG
is insecure. Take as an example a totaly stupid PRNG generating the
sequence
seed, seed+1, seed+2, ...
and try yourself.
From: Mok-Kong Shen on
Maaartin wrote:
> Mok-Kong Shen wrote:
>> Maaartin wrote:
>>> But having a fast perfectly secure PRNG you could simply xor it's
>>> output with the plaintext. Using an unsecure PRNG makes the Hill's
>>> scheme vulnarable again. And again, you need an expensive analysis of
>>> the cipher what is just what you wanted to avoid.
>> I don't yet understand your last sentence. If an n*n matrix is
>> used to process less than n^2 units (characters or computer words)
>> of text, there simply isn't possible to recover that matrix, if
>> the analyst has the plaintext and ciphertext available. Thus,
>> inferring the parameters of the PRNG would not be feasible in
>> my view.
>
> Maybe you can't recover the matrix, but surely you can learn a lot of
> about it. Using this information you can break the scheme if the PRNG
> is insecure. Take as an example a totaly stupid PRNG generating the
> sequence
> seed, seed+1, seed+2, ...
> and try yourself.

Why should we make such an assumption? (One doesn't walk on the street
with a helmet just because some bolt possibly might fall down from
a helicopter flying over one's head, right?) We have nowadays, in
constrast to the time of classical crypto, good PRNGs like the recent
one by Marsaglia.

M. K. Shen
First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7
Prev: Merry Christmas 10
Next: test