First  |  Prev |  Next  |  Last
Pages: 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Prime Number Sums reveal both a 2D and 3D pattern when stepped by the golden ratio logarithm!
On Apr 22, 2:46 pm, rom...(a)sbcglobal.net wrote: ABSTRACT: Prime Number Sums reveal both a  2D and 3D pattern  when stepped by the golden ratio logarithm! <CENTER><H3>Assumptions & Hypothesis</H3></CENTER> It is well known that Prime Number [PN] attributes are logarithmic and that they form an upwar... 23 Apr 2010 17:55
unique pemutation using 3DES
Hi, I am working on a problem where we have to share account ids with another party. Account ids in this problem are 64 bit numeric quantities. We do not want to reveal the id but want to preserve 1:1 mapping to allow 3rd party to correlate using the transformed id on some event stream. The number of ids is huge... 23 Apr 2010 21:23
entropy and the Yarrow PRNG for key generation
Hi, I'm currently reading the paper about Yarrow (a secure PRNG from Schneier and others, see http://www.schneier.com/paper-yarrow.html), and I'm trying to understand the importance of the amount of entropy that the PRNG provides for its quality as generator for bulk data encryption keys. Although Yarrow may... 23 Apr 2010 17:55
Public/Public
Peter Fairbrother wrote: - so is there an other suitable adjective for "known to the public", widely known, not-a-secret? Would "well-known" qualify? (But I am non-native!) M. K. Shen ... 23 Apr 2010 17:55
Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.
On Mon, 19 Apr 2010 14:07:27 -0700 (PDT), Maaartin <grajcar1(a)seznam.cz> wrote: How does it come? Imagine a message consisting of lowercase english letters only and the "database" consisting of only 26 distinct characters. What you get from "Mutual Database Cryptography" is monoalphabetic cipher, quite far fr... 23 Apr 2010 21:23
Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.
These are the proposed new broader crypto classes. Explicit Encapsulation. All existing mainstream cryptography belongs in this class in which the plaintext is transformed and encapsulated directly as cipher text and later recovered piecemeal by some special means. The ciphertext string is rather like a zip-f... 20 Apr 2010 16:17
Are online password managers safe to use?
I have been looking into online password managers lately because I think they are much more useful than locally stored password managers such as KeePass. I have four candidates in mind: Passpack.com Lastpass.com clipperz.com Mitto.com Besides interface usability, they all claim to use AES 256 bit ... 23 Apr 2010 21:23
Shamir's Identity Based Encryption -- consensus
Back in 1978 Adi Shamir described something he called Identity Based Encryption (IBE). He stated three characteristics that I paraphrase here: 1. Create a secure communications without (external key exchanges) communications 2. No directories (this excludes certificates) 3. No third parties (I assume he means ... 20 Apr 2010 16:17
Explicit Encapsulation Within the Ciphertext or Implicit Markup Database.
On Apr 19, 9:07 pm, Richard Outerbridge <ou...(a)interlog.com> wrote: In article <13473722-2219-4592-a678-fef834ef3...(a)y14g2000yqm.googlegroups.com>,  adacrypt <austin.oby...(a)hotmail.com> wrote: These are the proposed new broader crypto classes. Explicit Encapsulation. This would seem to be... 20 Apr 2010 16:17
Trying to explain A, B and C in Cryptology
Off-topic, but it's too fun to not share... I'm trying to explain who Alice, Bob and Charlie is (you know, basic RSA and PubPriv key encryption) to my wife and daughter. After a really good explanation (I think, of course) - my daughter concludes: "So You're Alice in Wonderland trying to send a message to Bob ... 20 Apr 2010 16:17
First  |  Prev |  Next  |  Last
Pages: 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32