From: Mok-Kong Shen on
Mok-Kong Shen wrote:
> Maaartin wrote:
>
>> I generated the 4 int parameters and 100 ints as plaintext. I
>> encrypted it and gave the plaintext and the ciphertext to the solver.
>> The solver computed the 4 int parameters. I repeated it all 10 times.
>>
>>
>> I recommend reading the last posting by Bryan carefully, his
>> explanation is very nice. He made two sort of typos, it should read
>> "(number_of_unknowns - number_of_equations) is still 55."
>> and
>> "(unknowns - equations) drops to 47."
>> but it's obvious.
>
> O.k. That means you are ready to accept my original offer as given
> in my post of 29.04.2010 19:02, right? We could start to negotiate
> a concrete contract now, i.e. discussing whether there are tiny
> details that need yet to be settled.

Mr. Maaartin, I sincerely hope that you are making progress in your
work. I like simply to remind you that my offer will expire on 1st June.

Regards,

M. K. Shen

From: Bryan on
Mok-Kong Shen wrote:
> Mr. Maaartin, I sincerely hope that you are making progress in your
> work. I like simply to remind you that my offer will expire on 1st June.

How has your own work on analyzing your schemes been going, Mr. Shen?
I went through and example, to show how an attacker obtains more
equations than unknowns, which seemed to be the part you thought
impossible. Given that, what have you been able to solve? Any results
to report yet?


--
--Bryan
From: Mok-Kong Shen on
Bryan wrote:
> Mok-Kong Shen wrote:
>> Mr. Maaartin, I sincerely hope that you are making progress in your
>> work. I like simply to remind you that my offer will expire on 1st June.
>
> How has your own work on analyzing your schemes been going, Mr. Shen?
> I went through and example, to show how an attacker obtains more
> equations than unknowns, which seemed to be the part you thought
> impossible. Given that, what have you been able to solve? Any results
> to report yet?

In the other thread "Dynamic Hillcipher", which is the predecessor of
this thread, I wrote:

I should be grateful to learn concrete hints of techniques of attack
if any.

and in the first post of this thread I wrote:

As layman I have yet no clue at all how to proceed from that equation
to predicting the PRNGs.

I suppose that answered very well the questions you asked.

Mr. Maartin in his last post reported an evidently spectacular success
with his analysis techninique, which appeared to be based on an idea
similar to that of yours but he independently developed. This is to
be clearly seen from the wording of his last post. Note that he was
able to at once pick out a (tiny) mistake of yours.

But anyway the challenge is for Mr. Maaartin personally. Please don't
interfere and let him express his opinions himslef in that matter.
You are free to assist Mr. Maaartin, though, through providing him
scientific concrete hints. In fact that's welcome (see a previous post
of mine), excepting that you shouldn't give "exhaustive descriptions".

M. K. Shen

From: unruh on
On 2010-05-18, Mok-Kong Shen <mok-kong.shen(a)t-online.de> wrote:
> Bryan wrote:
>> Mok-Kong Shen wrote:
>>> Mr. Maaartin, I sincerely hope that you are making progress in your
>>> work. I like simply to remind you that my offer will expire on 1st June.
>>
>> How has your own work on analyzing your schemes been going, Mr. Shen?
>> I went through and example, to show how an attacker obtains more
>> equations than unknowns, which seemed to be the part you thought
>> impossible. Given that, what have you been able to solve? Any results
>> to report yet?
>
> In the other thread "Dynamic Hillcipher", which is the predecessor of
> this thread, I wrote:
>
> I should be grateful to learn concrete hints of techniques of attack
> if any.

So I guess we should regard this as "less than very encouraging".


>
> and in the first post of this thread I wrote:
>
> As layman I have yet no clue at all how to proceed from that equation
> to predicting the PRNGs.
>
> I suppose that answered very well the questions you asked.
>
> Mr. Maartin in his last post reported an evidently spectacular success
> with his analysis techninique, which appeared to be based on an idea
> similar to that of yours but he independently developed. This is to
> be clearly seen from the wording of his last post. Note that he was
> able to at once pick out a (tiny) mistake of yours.
>
> But anyway the challenge is for Mr. Maaartin personally. Please don't
> interfere and let him express his opinions himslef in that matter.
> You are free to assist Mr. Maaartin, though, through providing him
> scientific concrete hints. In fact that's welcome (see a previous post
> of mine), excepting that you shouldn't give "exhaustive descriptions".
>
And now as a layman you are going to direct other people in how they do
their research! Sheesh.

From: Mok-Kong Shen on
unruh wrote:
> Mok-Kong Shen wrote:
>>
>> I should be grateful to learn concrete hints of techniques of attack
>> if any.
>
> So I guess we should regard this as "less than very encouraging".

The citation from the researchers you indirectly referred to, namely:
"Unfortunately we do not have a security proof, and we leave it as an
open problem to find an attack or prove its security," undeniably
applies here as well. Didn't I make that very clear at the "very"
beginning of my threads? (I explicitly wondered that my first thread
had generated very much "winds".)

M. K. Shen


First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7
Prev: How cool is this?
Next: The Winds of Change.