Prev: Call for Papers: International Conference on Electrical Engineering and Applications ICEEA 2010
Next: Encrypting odd sized buffers
From: adacrypt on 21 Jun 2010 08:48 Advances in computer science will most certainly dictate the classes of cryptography that may be forced on us in the future and whether we like it or not we may not have any say in the matter of what transpires as the way forward in the future of the cryptography industry. The case has been made by me in frequent posts for Mutual Database Cryptography and it is useful to spell out the subclasses that will exist in this broad general class. All cryptography will be studiously devoid of function mathematics on the basis that if ciphertext is created by transforming plaintext into ciphertext by mathematical means it can be inverted also by other mathematics the prognosis therefore is that there can never be any expectation of theoretically unbreakable cryptography from that source i.e. these are mathematically driven highly transparent ciphers that are complexity- theoretic and depend on keys embedded within the ciphertext or keys requiring separate transport by secure means. Future cryptography will all be on the basis of mapping plaintext directly to scattered points in space. That will be done in a sporadic but retrievable way that is only barely mathematical per se by using rudimentary and very minimal methods. This totally disables the scope of cryptanalysis. In the case of mapping plaintext to points in three-dimensional space, coordinate plane methods will be used on vector algebraic variables. The XY plane is a subset of three-dimensional space where Z = 0, the methods to be used then will be scalar. This is a broad but definitive overview that has been thoroughly expounded already in posts to sci crypt and on my websites http://www.adacrytp.com (see A New Approach to Cryptography) and on http://www.scalarcryptography.co.uk (this latter exposition is something less that simple because it breaks new ground in modular arithmetic methodology it needs to teased out by well equipped mathematicians). There is a big question mark regarding current cryptography that uses the XY plane also. Although practically unbreakable cryptography is de rigueur in main stream cryptography today at both national and commercials levels the fact remains that theoretically unbreakable cryptography will always be the first prize at national level and changes can be expected as the threat from increasing computer power becomes too close for comfort and the vector cryptography on offer by me becomes more attractive to users as a result. The current spate of less than perfect ciphers are still of great interest to everybody. Pursuing such cryptography can only be a cultural pursuit in mathematics however that is more an art form than a realistic prospect to national security and long may it continue as such but with the understanding that it is a very temporal thing that has to be ready to accede to being superseded suddenly should say quantum computers ever become common-place items. It is only as commendable as chess or difficult scrabble or even prodigiously difficult crossword puzzles. This is not meant to be demeaning of peoples efforts but you got to get real about it there is no scientific future for this cryptography other than a hobby topic in applied mathematics and it is a case of living in a fools paradise to go on banging the drum for its continuance in global secure communications - adacrypt
From: Globemaker on 21 Jun 2010 10:41 > it breaks new ground in modular arithmetic methodology - it needs to > teased out by well equipped mathematicians). Even better, paid mathemticians would be used, so that they would be motivated to finish your project. Your algorism can be published in Popular Cryptography Magazine. Sycophants and Dilettantes Needed for "Popular Cryptography Magazine" Öïñ á÷éïìáôéc óïõñcåó ïö ëå÷écïãñáðçî, óåå çôôð://ùùù.åôîìïíëéíå.cïì Announcing the start of "Popular Cryptography Magazine". Writers are needed to produce the first Ada issue, to be published on June 22, 2010. The readers of sci.crypt and alt.ego.psych who are sycophants or dilettantes are invited to submit encrypted essays that will be published anonymously or pseudonyminally on a new website. This magazine focuses on vestigial artifacts abandoned by a throwback who attempts briefly to decrypt submissions and who then emerges from obscurity. This will be a densely written manifold Adacrypt text which conceals messages from a goal set long ago. Turgid phraseology and languid smarminess deplete the manuscript of complacency generating dogma. A glossary is given at the end. English words that are excessively convoluted are devoluted critically, lending creative erudition to an otherwise incomprehensible magazine. An effort is made to preclude ubiquitous elocution, however, the effort fails, dramatically at times, but usually with aplomb, I think.
From: rossum on 21 Jun 2010 11:21 On Mon, 21 Jun 2010 07:41:32 -0700 (PDT), Globemaker <alanfolmsbee(a)cabanova.com> wrote: >Sycophants and Dilettantes Needed for "Popular Cryptography Magazine" I think you might find that that particular marketing niche is already filled by: http://www.anagram.com/~jcrap/ I particularly enjoyed Malgorzata Kupiecka's article about advanced Roman cryptography: http://www.anagram.com/~jcrap/Volume_3/caesar.pdf rossum
From: Gordon Burditt on 21 Jun 2010 12:53 >Advances in computer science will most certainly dictate the classes >of cryptography that may be forced on us in the future and whether we >like it or not we may not have any say in the matter of what >transpires as the way forward in the future of the cryptography >industry. One of these things which has pretty much already happened is that plaintext is a computer file, and you'd better be prepared to reproduce it exactly bit-for-bit in an encrypt/decrypt cycle. It might be audio, video, a computer program, or text (with or without word-processing attributes and embedded images), or lots of other stuff. "printable ASCII only" with newlines inserted at stupid positions is not acceptable. >The case has been made by me in frequent posts for Mutual Database >Cryptography and it is useful to spell out the subclasses that will Mutual Database Cryptography gets out of sync if messages are decrypted out of order, duplicated, or corrupted in transit. That's "just a management issue" that adacrypt doesn't want to talk about. Still, it's a serious problem for most applications, and it makes it really easy for an enemy to foul up communications at just the time when they are most needed. >exist in this broad general class. All cryptography will be studiously >devoid of function mathematics on the basis that if ciphertext is >created by transforming plaintext into ciphertext by mathematical >means it can be inverted also by other mathematics � You do know that vectors use mathematics, don't you? Are you throwing your last set of cryptography under the bus, again? >the prognosis >therefore is that there can never be any expectation of theoretically >unbreakable cryptography from that source i.e. these are >mathematically driven highly transparent ciphers that are complexity- >theoretic and depend on keys embedded within the ciphertext or keys >requiring separate transport by secure means. I expect no theoretically unbreakable cryptography from adacrypt until he admits that it requires a key at least the size of the sum of the sizes of all messages to be sent. >Future cryptography will all be on the basis of mapping plaintext >directly to scattered points in space. That will be done in a >sporadic The only meaning for "sporadic" here that seems to make sense is "except when I'm drunk or stoned", which ties in to hallucinogen-based cryptography. No, I'm not going to give you a link to a dealer, because I don't have one. >but retrievable way that is only barely mathematical per se >by using rudimentary and very minimal methods. This totally disables >the scope of cryptanalysis. This requires a jinormous pre-shared key the size of the plaintext you intend sending over the lifetime of the channel. This presents equally jinormous management problems, which adacrypt doesn't like to discuss here because he doesn't have any answers for the problems involved. >In the case of mapping plaintext to points in three-dimensional space, >coordinate plane methods will be used on vector algebraic variables. > >The XY plane is a subset of three-dimensional space where Z = 0, the >methods to be used then will be scalar. Scalar is two-dimensional? Since when? >This is a broad but definitive overview that has been thoroughly >expounded already in posts to sci crypt and on my websites >http://www.adacrytp.com >(see �A New Approach to Cryptography�) and on >http://www.scalarcryptography.co.uk >(this latter exposition is something less that simple because it >breaks new ground in modular arithmetic methodology � it needs to >teased out by well equipped mathematicians). >There is a big question mark regarding current cryptography that uses >the XY plane also. Although practically unbreakable cryptography is >de rigueur in main stream cryptography today at both national and >commercials levels the fact remains that theoretically unbreakable >cryptography will always be the first prize at national level and Theoretically unbreakable cryptography is unsuitable for many cryptographic applications, due to requirements for a secure channel, a large pre-shared key, and it cannot do public-key cryptography. >changes can be expected as the threat from increasing computer power >becomes too close for comfort and the vector cryptography on offer by >me becomes more attractive to users as a result. Was that the vectors that don't require math? >The current spate of less than perfect ciphers are still of great >interest to everybody. Pursuing such cryptography can only be a >cultural pursuit in mathematics however that is more an art form than >a realistic prospect to national security and long may it continue as >such but with the understanding that it is a very temporal thing that >has to be ready to accede to being superseded suddenly should say >quantum computers ever become common-place items. It is only as >commendable as chess or difficult scrabble or even prodigiously >difficult crossword puzzles. This is not meant to be demeaning of >peoples efforts but you got to get real about it � there is no Get real about it: theoretically unbreakable cryptography is unsuitable for most applications because of the need for a very large pre-shared key. >scientific future for this cryptography other than a hobby topic in >applied mathematics and it is a case of living in a fools� paradise to >go on banging the drum for its continuance in global secure >communications - adacrypt
From: Bruce Stephens on 21 Jun 2010 13:36
gordonb.k8wza(a)burditt.org (Gordon Burditt) writes: [...] > Mutual Database Cryptography gets out of sync if messages are > decrypted out of order, duplicated, or corrupted in transit. That's > "just a management issue" that adacrypt doesn't want to talk about. Just as bad the databases must be kept secret or the perfect security property no longer holds. [...] > You do know that vectors use mathematics, don't you? Are you throwing > your last set of cryptography under the bus, again? He's previously argued that *his* vectors are real physical Vectors not the ordinary numerical analysis vectors. I've no idea what he thinks that means, but perhaps that's why he uses only 3-dimensional vectors? [...] |