From: adacrypt on
Given that perfect secrecy of communications or as the “Handbook of
Applied Cryptography” puts it, theoretically unbreakable strength of
security, is a definitive state, there are can be no degrees of
comparison between competing ciphers. Secure means secure – nothing
more – nothing less.

In passing, the paucity of such ciphers at present signals that the
likelihood of that happy state i.e. unbreakable ciphers competing with
each other for supremacy is not likely to be realised for some time
although it is very possible in the vector cryptography that I have
invented.

The question begs, “does the industry need anything more than one good
cipher?”. I say no but rather than close the door on any area of
human endeavour I say that if it ever comes to that happy state of
having a choice of ciphers (written by any reader) then the yardstick
has to be total security as a foregone conclusion firstly, followed by
efficiency next and then elegance. Elegance is a flag of excellent
intelligence in our human nature and is always some thing to be
considered after the more essential basic boxes have been ticked, long
may it live!

As an arena for creative writing the unbreakable cipher is an arid
desert at the present time but it is to be seen in vector cryptography
especially, that once the shackles of habit have been overcome and the
inertia of change has been shaken off then there is an exciting new
field of possibilities for the more broad-minded reader.

Totally viable, unbreakable security of information is a worldwide
birthright – there is no room for small-minded parochial thinking
about which nationality first invents it - it is there now -
adacrypt




From: Dave -Turner on
Dear Adacrypt,

Why are you the only person talking about "vector cryptography"?

Why are there only 1070 google matches for that phrase?

Why are no reputed cryptography experts talking about it, or even bothering
to refute what you say?

Why do you go on and on about mindnumbing theory that makes no sense (as if
to just make us believe that what you're saying is gospel) when you provide
....

.... wait for it ...

No mathematical proofs?


From: starwars on
Killfile him like everyone else

From: Gordon Burditt on
>Given that perfect secrecy of communications or as the �Handbook of
>Applied Cryptography� puts it, theoretically unbreakable strength of
>security, is a definitive state, there are can be no degrees of
>comparison between competing ciphers.

"Adacrypt Administrative Nightmare" is absolute.

>Secure means secure � nothing
>more � nothing less.

A cipher that requires the exchange of large amounts of keying
material through a secure channel between strangers will never be
acceptable for e-commerce (or even postal mail commerce) between a
business and its customers.

A cipher that gets out of sync if messages arrive out of order,
messages are garbled, messages are replayed, or an adversary fools
you into attempting to decrypt a fake message is unsuitable for use
in the real world. (Example: how common is SPAM that claims to
be from your bank?) It gets taken down by a denial-of-service
attack too easily.

> In passing, the paucity of such ciphers at present signals that the
>likelihood of that happy state i.e. unbreakable ciphers competing with
>each other for supremacy is not likely to be realised for some time
>although it is very possible in the vector cryptography that I have
>invented.
>
>The question begs, �does the industry need anything more than one good
>cipher?�.

Yes. Public-key cryptography has some highly desirable properties
for some applications, and those properties are useless for other
applications.

If your customer *is* the adversary (DRM applications like cable
boxes), you need to resort to tamper-proof hardware so the customer
can't get the key out of it.

Some endpoints are not able to store large amounts of keying material,
compared to the message traffic, so theoretically unbreakable ciphers
are out. Some of them cannot easily get new keying material. (Space
probes, spy satellites, smart cards, and cable boxes that have to
be able to decrypt any of 100 channels of video, 24x7 come to mind
here.)

>I say no but rather than close the door on any area of
>human endeavour I say that if it ever comes to that happy state of
>having a choice of ciphers (written by any reader) then the yardstick
>has to be total security as a foregone conclusion firstly, followed by
>efficiency next and then elegance.

Incorrect. For many applications, total security is thrown out
right away as impractical because of the intended use, or because
of the cost. Crypto applications don't come in one-size-fits-all.
Sometimes you're trying to protect military secrets. Sometimes
you're trying to protect against copying a movie that rents for $2.
Sometimes the security of ROT 13 *is* overkill.

From: Dave -Turner on
> Sometimes the security of ROT 13 *is* overkill.

I prefer XOR 0x69 on every byte. Gives me warm fuzzies.