Prev: Merry Christmas 10
Next: test
From: WTShaw on 23 Dec 2009 06:06 On Dec 17, 6:31 am, WTShaw <lure...(a)gmail.com> wrote: > > dgqavbxzmjwfykiolehtpncusr > qcvuhndkposbayjlmgtfwzixre > mbcklfxngjpihtdseozyaqwruv > zovptnjgwhiakcqudmrsbeyflx > sybrncfptaozhekmdxjiglvuqw > klgvdfyntiuoaqprjhmcwszebx > klzypgqhtefadxmvjrnwicubos > ogvtzwdibmplkjefcayrqsunxh Concerning recoverability of the sources texts for these permutations, their nature as linked hashes would suggest likely ambiguity in suggested recoveries which by comparisons of lines might suggest a widespread known passage if used. Because of the combined hashing nature of the linked lines, a case might be made that for any given line as a hash that the source could not be absolutely defined and that all line hashes are equal as in possibility from a draw. There are more ways to further obscure the source but our present occupation is to go beyond that focus. Even though the source of the permutations is obscured by hashes, use of the array as a simple linear key for different encryptions might lead to frequency analysis of coincidences between the passages, their solutions, and ultimately to the above representation. An improvement would be not to use these permutations as simple linear keys at all but as rotatable wheels in more complicated systems where the nature of the working key is better hidden. Appropriate advanced algorithms utilizing premutations can be capable of all degrees of increased security over simplistic linear approaches. |