From: WTShaw on
On Jun 29, 6:39 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
> On Jun 29, 11:36 am, Globemaker <alanfolms...(a)cabanova.com> wrote:
>
>
>
> > adacrypt said:
>
> > > One way or another this launching of "Popular Cryptography Magazine"
> > > is a turning point for the good in crypto publications in my view - I
> > > just hope that they will change the goal posts  - I reckon if they
> > > worked on a policy of publishing by meritorios invitation it would
> > > become such a coveted prize that it would fill a much needed niche
> > > between say the American Mathematical Society and  sci crypt. -
> > > adacry
>
> > During these early stages of evaluating your Vector Cipher 2, I am
> > focussing on two aspects for Popular Cryptography Magazine:
> > I cannot find a place in your software to enter a key of all zeros.
> > When I tried to encrypt a file with 24 megabytes of ASCII information,
> > the ciphertext was only 3 kilobytes long.
> > Do you, adacrypt, have any comment on those two issues?
>
> > Are these the right programs to be evaluating?
> > real_time_encryption_program_mark_2.exe
> > batch_encryption_program_mark_2.exe
> > general­_encryption_program_mark_2.exe
> > general­_decryption_program_mark_2.exe
>
> Hi,
>
> >Are these the right programs to be evaluating?
> >real_time_encryption_program_mark_2.exe
> >batch_encryption_program_mark_2.exe
> >general­_encryption_program_mark_2.exe
>
>  Yes, these are the right programs alright.
>
> That version does not display any of the internal computations at
> runtime that Mark_0 does - it is a working version - it also an exact
> copy of Mark_1
>
> I have no idea what a key of all zeros that you mention is and there
> is no accomodation in my source code for it - I suspect my cipher is
> rejecting something it is not intended to do - it may sound small-
> minded but frankly the only thing I want to understand is security of
> information that is encrypted by one of the two cipher types (sporadic
> mapping to integer points in space) - that I am promoting - I want to
> cooperate with you and suggest that if you email me a file of
> plaintext - I will encrypt it at my end and compare results - remember
> I work in denary all the time - no binary ever - except inside my
> computer as machine code - hope to hear from - cheers - Adacrypt

Anyone might make a particular program work on one computer as he is
accustomed to do, but try it on several for grins. Programming
languages can mess up due to corruption of the sources,
incompatibilities of platform, or less than transparent
communications. Visit a friend, let him download it and attempt to
make it work. You can learn lots this way. Every day furnishes new
opportunities to go astray. Concentrate and learn, do it myself.
From: adacrypt on
On Jun 29, 1:12 pm, WTShaw <lure...(a)gmail.com> wrote:
> On Jun 29, 6:39 am, adacrypt <austin.oby...(a)hotmail.com> wrote:
>
>
>
>
>
> > On Jun 29, 11:36 am, Globemaker <alanfolms...(a)cabanova.com> wrote:
>
> > > adacrypt said:
>
> > > > One way or another this launching of "Popular Cryptography Magazine"
> > > > is a turning point for the good in crypto publications in my view - I
> > > > just hope that they will change the goal posts  - I reckon if they
> > > > worked on a policy of publishing by meritorios invitation it would
> > > > become such a coveted prize that it would fill a much needed niche
> > > > between say the American Mathematical Society and  sci crypt. -
> > > > adacry
>
> > > During these early stages of evaluating your Vector Cipher 2, I am
> > > focussing on two aspects for Popular Cryptography Magazine:
> > > I cannot find a place in your software to enter a key of all zeros.
> > > When I tried to encrypt a file with 24 megabytes of ASCII information,
> > > the ciphertext was only 3 kilobytes long.
> > > Do you, adacrypt, have any comment on those two issues?
>
> > > Are these the right programs to be evaluating?
> > > real_time_encryption_program_mark_2.exe
> > > batch_encryption_program_mark_2.exe
> > > general­_encryption_program_mark_2.exe
> > > general­_decryption_program_mark_2.exe
>
> > Hi,
>
> > >Are these the right programs to be evaluating?
> > >real_time_encryption_program_mark_2.exe
> > >batch_encryption_program_mark_2.exe
> > >general­_encryption_program_mark_2.exe
>
> >  Yes, these are the right programs alright.
>
> > That version does not display any of the internal computations at
> > runtime that Mark_0 does - it is a working version - it also an exact
> > copy of Mark_1
>
> > I have no idea what a key of all zeros that you mention is and there
> > is no accomodation in my source code for it - I suspect my cipher is
> > rejecting something it is not intended to do - it may sound small-
> > minded but frankly the only thing I want to understand is security of
> > information that is encrypted by one of the two cipher types (sporadic
> > mapping to integer points in space) - that I am promoting - I want to
> > cooperate with you and suggest that if you email me a file of
> > plaintext - I will encrypt it at my end and compare results - remember
> > I work in denary all the time - no binary ever - except inside my
> > computer as machine code - hope to hear from - cheers - Adacrypt
>
> Anyone might make a particular program work on one computer as he is
> accustomed to do, but try it on several for grins.  Programming
> languages can mess up due to corruption of the sources,
> incompatibilities of platform, or less than transparent
> communications.  Visit a friend, let him download it and attempt to
> make it work.  You can learn lots this way. Every day furnishes new
> opportunities to go astray. Concentrate and learn, do it myself.- Hide quoted text -
>
> - Show quoted text -

Yup !
I accept that as a very essential part of the beta testing ! - regards
- adacrypt
From: adacrypt on
On Jun 29, 11:36 am, Globemaker <alanfolms...(a)cabanova.com> wrote:
> adacrypt said:
>
> > One way or another this launching of "Popular Cryptography Magazine"
> > is a turning point for the good in crypto publications in my view - I
> > just hope that they will change the goal posts  - I reckon if they
> > worked on a policy of publishing by meritorios invitation it would
> > become such a coveted prize that it would fill a much needed niche
> > between say the American Mathematical Society and  sci crypt. -
> > adacry
>
> During these early stages of evaluating your Vector Cipher 2, I am
> focussing on two aspects for Popular Cryptography Magazine:
> I cannot find a place in your software to enter a key of all zeros.
> When I tried to encrypt a file with 24 megabytes of ASCII information,
> the ciphertext was only 3 kilobytes long.
> Do you, adacrypt, have any comment on those two issues?
>
> Are these the right programs to be evaluating?
> real_time_encryption_program_mark_2.exe
> batch_encryption_program_mark_2.exe
> general­_encryption_program_mark_2.exe
> general­_decryption_program_mark_2.exe

Hi,
Suggest also running the Mark_0 program and see where it crashes out
- that is what it is there for - a diagnostic program
From: Dave -Turner on
At the end of the day youve destroyed the security by telling people how to
decrypt said messages, so really - what is the point of ANY security??? The
only thing it does is waste peoples time, and nobody likes that. There is NO
security because you've provided everybody the key and algorithm to decrypt
it, thus reducing it to a simple time-wasting exercise. Sorry, but it just
doesn't make sense - the ONLY thing it does is waste peoples time.



From: adacrypt on
On Jun 29, 5:26 pm, "Dave -Turner" <ad...(a)127.0.0.1> wrote:
> At the end of the day youve destroyed the security by telling people how to
> decrypt said messages, so really - what is the point of ANY security??? The
> only thing it does is waste peoples time, and nobody likes that. There is NO
> security because you've provided everybody the key and algorithm to decrypt
> it, thus reducing it to a simple time-wasting exercise. Sorry, but it just
> doesn't make sense - the ONLY thing it does is waste peoples time.

Naw Dave,

I think you have posted this in the wrong place.

The change-of-origin ploy is the basis of a one-way function - it is
totally and utterly impossible to reverse except by access to the
mutual databases - as long as Alice and Bob keep these secret then it
is impossible for anybody to know what the change-of-orign was that is
used for any item of ciphertext - each item of ciphertext has a
different one - it virtually needs a transfer of data from a human
memory to a computer memory - Only Alice and Bob can do that - there
is no secret about anything else - as it should be in principle
according to basic crypto - one-way functions are only workable by
means of mutual database technology - no sweat about how much is
public - at the end of the day Eve cannot get past the change-of-
origin stumbling block - cheers - adacrypt