From: WTShaw on
On Dec 17, 6:31 am, WTShaw <lure...(a)gmail.com> wrote:

>
> dgqavbxzmjwfykiolehtpncusr
> qcvuhndkposbayjlmgtfwzixre
> mbcklfxngjpihtdseozyaqwruv
> zovptnjgwhiakcqudmrsbeyflx
> sybrncfptaozhekmdxjiglvuqw
> klgvdfyntiuoaqprjhmcwszebx
> klzypgqhtefadxmvjrnwicubos
> ogvtzwdibmplkjefcayrqsunxh

Concerning recoverability of the sources texts for these permutations,
their nature as linked hashes would suggest likely ambiguity in
suggested recoveries which by comparisons of lines might suggest a
widespread known passage if used. Because of the combined hashing
nature of the linked lines, a case might be made that for any given
line as a hash that the source could not be absolutely defined and
that all line hashes are equal as in possibility from a draw. There
are more ways to further obscure the source but our present occupation
is to go beyond that focus.

Even though the source of the permutations is obscured by hashes, use
of the array as a simple linear key for different encryptions might
lead to frequency analysis of coincidences between the passages, their
solutions, and ultimately to the above representation. An improvement
would be not to use these permutations as simple linear keys at all
but as rotatable wheels in more complicated systems where the nature
of the working key is better hidden. Appropriate advanced algorithms
utilizing premutations can be capable of all degrees of increased
security over simplistic linear approaches.
First  |  Prev  | 
Pages: 1 2 3 4 5 6 7
Prev: Merry Christmas 10
Next: test