Re: Upload to website “A Modernised One-time pad” http://www.adacrypt.com



austin.obyrne@xxxxxxxxxxx wrote:
Let the reader understand straight away that this cipher is not being
plagiarized from Major Joseph Mauborgne who is the only inventor (co-
inventor with Gilbert Vernam circa 1920) of the famous cipher of that
name. Rather it is as a completion of his famous work that no doubt he
would have done himself if he was here to day in our privileged world
of hi-tech computing.

A salient thing about the cipher on display is the algorithm that this
version uses. The Vigenere square at the heart of this version of
Joseph Mauborgne’s cipher is comprised not of the 26 alphabetic
characters as of old but is instead made up of a square that has the
ASCII set of 95 alphanumeric characters as its defining sides. The
upshot of doing this is that the resultant cipher text is comprised
entirely of alphanumeric characters.

The cipher text has no common methodology that a cryptanalyst might
use, lexical methods will not work on numbers or computer control
symbols and arithmetic methods will not work on characters of the
English language.

It is not possible for cryptanalysts to create search engine programs
or brute force programs because these will require so much user
assistance that they are virtually useless in practice.

The data can only be effectively operated on as an enumeration type
within programming languages which is common place today in any case
but it does make randomness of the key space more easily achievable
when using this data type in a computer.

A permutation space of 14250 ! (factorial) of key pads and ensuing
messagetexts is available in any length of message from 1 to 14250
characters long.

The algorithm is still much the same,
(Key + Plaintext) Mod 127 = Cipher text.

The cipher is an up and running realisation to hand. It is written in
Ada-95 which Joseph Mauborgne would have had to use anyway being a US
Army officer. It is a truly elegant, profoundly stable and
theoretically unbreakable cipher. It can be demonstrated with the
veracity of mathematical proof at every turn.

The encryption rate on an old clapped out home computer of 384
megabytes of RAM and 486 megahertz processor speed is 10852 characters
in les than 1 second. The decryption rate is a bit slower at 2
seconds for the same amount of cipher text.

Subject to beta testing this cipher is truly remarkable and is ready
for assimilation into main stream cryptography as the first ever
“Theoretically Unbreakable” working cipher. It is no longer an
unworkable paradox.

It is hoped the authorities will see sense and reinstate this cipher
now to where it belongs in main stream cryptography as an everyday
cryptosystem. – adacrypt
http://www.adacrypt.com

Excuse me. I have a lot of text to send so I would like to compress it first and add a few pictures. All in all a fairly common and useful task. How will you efficiently deal with it?
.



Relevant Pages

  • Re: comments on cipher please
    ... this makes sure that each key generated is 8 characters long and not ... character key that is used to cipher the file. ... PassKeyRight = CryptedFileData xor PassKeyRight ...
    (sci.crypt)
  • =?windows-1252?Q?Re=3A_Encrypting_Unicode_=96_Using_ASCII_as_a_Surrogat?= =?windows-1252?Q?e
    ... characters of an exotic eastern language using an ASCII keyboard. ... communicate in large volume with China or Japan using CJK from Unicode ... present the message text to Alice as a string of hexadecimal numbers ... by the computer as an external file and enciphered by a stream cipher ...
    (sci.crypt)
  • Re: Is there a Mathematician Cryptographr in the House.
    ... message length from one to 14250 characters long (as an arbitrary ... multiples of the 95 elements of the ASCII printable subset that will ... How the cipher works. ... representation of 80 in my plaintext domain of the ASCII printable ...
    (sci.crypt)
  • Re: Transversion: another primative
    ... Any such cipher obeys the ... is why might the output can be from a set of 36 characters as ... A few minutes, a few more algorithms. ... scrambled each has a characteristic scramble algorithm. ...
    (sci.crypt)
  • =?windows-1252?Q?Re=3A_Encrypting_Unicode_=96_Using_ASCII_as_a_Surrogat?= =?windows-1252?Q?e
    ... characters of an exotic eastern language using an ASCII keyboard. ... communicate in large volume with China or Japan using CJK from Unicode ... present the message text to Alice as a string of hexadecimal numbers ... by the computer as an external file and enciphered by a stream cipher ...
    (sci.crypt)