From: WTShaw on
On Jul 4, 8:46 am, adacrypt <austin.oby...(a)hotmail.com> wrote:

>
> PS - given that theoretically unbreakable cryptography is as rare as
> rockin' horse droppings you sound a bit patronising ? - adacrypt

Not rare, just usually awkward.

The criteria for strength are relatively simple but they are not
universally shared.

I believe you are generally on the right track but somehow you need
more rails. Perhaps the never-gonna-get-there group are more inclined
to route you around in circular arguments but I am dedicated to your
getting it all together, simplify your points to be brief and by skill
include the necessary particulars. OK, pick your best words, not so
many of them, and summarize the architecture of your most recent
system and post it here. This technique of communication, short and to
the point, is necessary to communicate with the clowns that have a
short attention span. For me. it's a shortage of time as I have so
little left.
From: adacrypt on
On Jul 4, 3:16 pm, WTShaw <lure...(a)gmail.com> wrote:
> On Jul 4, 8:46 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
>
>
>
> > PS - given that theoretically unbreakable cryptography is as rare as
> > rockin' horse droppings you sound a bit patronising ? - adacrypt
>
> Not rare, just usually awkward.
>
> The criteria for strength are relatively simple but they are not
> universally shared.
>
> I believe you are generally on the right track but somehow you need
> more rails.  Perhaps the never-gonna-get-there group are more inclined
> to route you around in circular arguments but I am dedicated to your
> getting it all together, simplify your points to be brief and by skill
> include the necessary particulars.  OK, pick your best words, not so
> many of them, and summarize the architecture of your most recent
> system and post it here. This technique of communication, short and to
> the point, is necessary to communicate with the clowns that have a
> short attention span. For me. it's a shortage of time as I have so
> little left.

Hi W.T.

>This technique of communication, short and to
>the point, is necessary to communicate with the clowns that have a
>short attention span. For me. it's a shortage of time as I have so
>little left.

Truly sorry to hear that last.

I take your point. Unfortunately this is not a well established maths
theorem that I can point readers to.

It is my private claim that emantes from undocking the Vigenere square
and moving it around to points that are (x +X), (y + X) instead of
merely the historic (x,y).

My algorithm evolves from the dynamics of doing this but always
landing later inside the square when I decrypt - not an easy concept
to envisage for anybody who is not au fait with 1) the Vigenere square
and 2) the modular arithmetic that arises 3) the notion of undocking
the square from (0,0)

Theory.

[(Key + X) +PlainText +X)] Mod N = a residue >= 0 for all N that
divides LHS just once => N must always be <= the sum [(Key + X)
+PlainText +X)] so as to leave a suitable resude

- This is a customised caveat that I am making a condition of the
residue - Finding the range of N's that will do this is something that
only the person who is au fait with modular arithmethic can understand
and I fear most readers will give up - I have created a computer
program that finds by empirical validation the range of N's (related
to X) that fill this bill - once it is understood the range of N can
written dowen directly as afunction of X i9n future for all X - X is a
positive integer - cheers -

This scalable key is powerful cryptography - much more efficient than
the vector cryptography from the same stable - adacrypt
From: adacrypt on
On Jul 4, 4:02 pm, adacrypt <austin.oby...(a)hotmail.com> wrote:
> On Jul 4, 3:16 pm, WTShaw <lure...(a)gmail.com> wrote:
>
>
>
>
>
> > On Jul 4, 8:46 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
>
> > > PS - given that theoretically unbreakable cryptography is as rare as
> > > rockin' horse droppings you sound a bit patronising ? - adacrypt
>
> > Not rare, just usually awkward.
>
> > The criteria for strength are relatively simple but they are not
> > universally shared.
>
> > I believe you are generally on the right track but somehow you need
> > more rails.  Perhaps the never-gonna-get-there group are more inclined
> > to route you around in circular arguments but I am dedicated to your
> > getting it all together, simplify your points to be brief and by skill
> > include the necessary particulars.  OK, pick your best words, not so
> > many of them, and summarize the architecture of your most recent
> > system and post it here. This technique of communication, short and to
> > the point, is necessary to communicate with the clowns that have a
> > short attention span. For me. it's a shortage of time as I have so
> > little left.
>
> Hi W.T.
>
> >This technique of communication, short and to
> >the point, is necessary to communicate with the clowns that have a
> >short attention span. For me. it's a shortage of time as I have so
> >little left.
>
> Truly sorry to hear that last.
>
> I take your point.  Unfortunately this is not a well established maths
> theorem that I can point readers to.
>
> It is my private claim that emantes from undocking the Vigenere square
> and moving it around to points that are (x +X), (y + X) instead of
> merely the historic (x,y).
>
> My algorithm evolves from the dynamics of doing this but always
> landing later inside the square when I decrypt - not an easy concept
> to envisage for anybody who is not au fait with 1) the Vigenere square
> and 2) the modular arithmetic that arises 3) the notion of undocking
> the square from (0,0)
>
> Theory.
>
> [(Key + X) +PlainText +X)] Mod N = a residue >= 0 for all N that
> divides LHS just once => N must always be <= the sum [(Key + X)
> +PlainText +X)] so as to leave a suitable resude
>
> - This is a customised caveat that I am making a condition of the
> residue - Finding the range of N's that will do this is something that
> only the person who is au fait with modular arithmethic can understand
> and I fear most readers will give up - I have created a computer
> program that finds by empirical validation the range of N's (related
> to X) that fill this bill - once it is understood the range of N can
> written dowen directly as afunction of X i9n future for all X - X is a
> positive integer - cheers -
>
> This scalable key is powerful cryptography - much more efficient than
> the vector cryptography from the same stable - adacrypt- Hide quoted text -
>
> - Show quoted text -

Hi ,

I take the view that necessity is the mother of invention and instinct
tells me that in the years ahead that necessity may come out of the
blue in cryptography and not from posting to news groups - meanwhile
there is no way that I would try and sway some ot the jeer leaders
into studying my stuff - its way over their heads anyway and they're
so used to playing with the box that cryptography comes in they really
think that is it - the gimickry and the marketing hype are
cryptography - an industry living off its defects is an apt
description - its about having a place in the crypto herd see - camp
followers mostly.

At the same time there are real experts who visit my two websites in
increasing numbers and I believe that if my stuff is ever to go
anywhere then it will be down some road of their making - remember,
the Vigenere cipher was on the table for a complete century before it
eventaully became recognised - it then lasted two centuries unbroken
until Kasiski came along.

Thank God for mathematics - nothing remains hidden for very long in
maths - altough mathematicians are also in that frame of mind of just
playing with the box today and not believing that there could be more
to come from unlikely non-specialist sources - they travel thousands
of miles to cheer each other on in mutual admiration conferences -
when will they ever learn - the emperor is stark naked but nobody
cares - cheers - adacrypt