Re: Solo Crypt_Cipher _ _Paired_User_Crypto_scheme
- From: gordonb.m598g@xxxxxxxxxxx (Gordon Burditt)
- Date: Fri, 10 Jul 2009 00:01:52 -0500
Schematic of a marketing plan to distribute Vector Cryptography under
A marketing plan, at least in the United States, is a collection
of frauds, misrepresentations and lies. This document fits that
The writer is retired and I have no intention of going back into the
work arena but I would like to test this sales pitch on real world,
hands-on cryptographers in Sci crypt as a hypothetical exercise.
Perhaps readers would point out what they see wrong here and there, I
have no doubt there are many things that might not work and additions
that I should make. Could it work is the question. Here goes anyway.
The concept of a single channel means one-to-one mapping of pairs of
entities of a secure communications system in a piece of direct
management that requires minimal knowledge of cryptography.
This sentence doesn't parse. I can't make any sense out of "a piece
of direct management", unless you use it in a context like "The
surgeon removed a piece of direct management, namely the vice
president's foot, from the patient's rectum.".
uses synchronized databases by the entities.
That means you re-use keys, which means the encryption system is *NOT*
The aim is transparency
and understanding by non-specialist users that will generate
confidence and enable them to focus on the management of their own
secure communications system only. Ease of management of a channel is
paramount so as to avoid mistakes and this is the reason for making a
channel specific to one sending entity and one receiving entity only
and even that can become taxing enough if the channel is busy. The
network of many such pairs may be large or small, the building block
is the single channel in each case, a single channel is dedicated by
being customized and parameter-configured strictly to those two
entities as the sole user. A network is a collection of channels.
The user instructions would be interesting here. Let's assume the
programs have been compiled and installed. This is two users sending
messages to each other, not a large organization. Also assume that
users know how to use an editor to create and read text files.
- How do you (a user) set up a channel to another user? Do you need
one synchronized database or two (one for each direction)? How are
those created? Where does the data in a synchronized database come from?
Is a special secure method of transporting data (like a trusted courier)
needed to transport new synchronized databases between users?
- How do you encrypt a message for sending? What determines what section
of the synchronized database will be used?
- How do you decrypt a message? How is it determined what section of the
synchronized database will be used? Is there a way of determining who
the message is *FROM*, so the appropriate synchronized database can
be selected (preferably automatically)?
(A desirable answer here is that you fire up "adadecrypt", tell it
the ciphertext file and synchrnoized database names, and it will
decrypt and handle everything automatically).
- What happens if messages are received out of order or some are lost?
- How do you RE-decrypt a message? You've got an old message, kept around
only in encrypted form for security reasons, and many, many messages
have been sent and received on the same channel since then. How
do you decrypt it for the year-end report?
A physical channel is a dedicated CD in a library of CD?s or stored
as such in a managed central database that comprises a network. The
Is that a read-only CD or a read-write CD-RW for the synchronized
database? The concept of "synchronized database" suggests that the
database *CHANGES*. A read-only CD isn't very compatible with that.
current practice of large central crypto infrastructures manned by
experts need not be the case in commerce at least or in subsections of
local government. The single business person user, diplomat, police or
military person needing just one channel is the main target for this
idea although it could be useful at any level of society. A large
finance house like the bigger banks may have a network of several
thousand channels managed by non-specialist trainees. Disaster
recovery is made easy by the portability of the single channel such
that an entire network can be replaced in a short time without
The software is complete as up and running programs of about 10
megabytes of source code each stored on a CD. The working programs
run as open source code and use the usual monochrome screen for
interactive use by the user. The CD?s are complete apart from needing
graphics to give them a more pleasing aesthetic appearance.
*Cryptographically, the most salient thing about this cipher and the
cryptography behind it is that it is a global first in the realization
of a theoretically unbreakable crypto system for use in main stream
Blatant lie. This system is not theoretically unbreakable.
Even America does not currently have this
crypto strength in its national security of secure communications and
instead has to settle for an unwieldy system that is termed
?practically unbreakable? only (not completely i.e. theoretically
unbreakable) in security of communications.
The cipher being promoted here is designed to run in any computer that
can host an Ada-95 programming language compiler 311.p by Ada-Core
Technologies. The operating system may be Windows, Macos, Linux,
Windows 98 is a typical operating system that the writer has used in
Ada-95 is the official programming language of the US government
Ministry of Defence which clears the way for easy acceptance by the
American National Security Association (NSA).
The US government is not permitted to have ministries. This violates
the first amendment to its constitution under the "establishment
of religion" clause. And there is no "National Security Association".
The project to put a large fence on the border between Texas and
Mexico doesn't really need encryption, and it's not called "De
It is also the language
of many safety-critical systems like air traffic control in all of the
UK, Boeing aircraft, the Paris Metro, the channel tunnel EuroStar,
the space program.
So what? English is the language of many, if not most, terrorist
threats, financial scams, and (false) advertising. Assembly language
is the language of many computer viruses. Does that make it more
or less desirable as a language?
The user needs no special training and can become proficient in about
20 minutes with normal key board skills as a starting point.
The measured encryption / decryption rate is 10852 characters in 1
second on my older computer that is way past its best and needs
frequent rebooting during a session.
The cipher is intended for electronic email conveyance of messages of
any length within the scope of the computer and for the secure storage
of cipher text of batch typing of plaintext in removable memory or
onboard secondary memory. Out of office usage is in mind here.
A single two-way channel is the recommended aim for most private
users, this simplifies the management level which can become quite
complex and labour-intensive when more than one entity is involved in
even a simple network involving more than one pair of entities.
Should a computer like a lap top be stolen from a car boot say then
there is only the value of the machine lost, there is no loss of
sensitive information or other.
This is very likely dangerously false. If this laptop was used to
compose and send a secret message, there are most likely remnants
of the plaintext of the message in deleted disk sectors. (Not the
fault of the encryption, but still a problem.) If the laptop was
used to decrypt a message, that plaintext may also be present on
deleted disk sectors. Also, capturing the synchronized database
(where is that kept again?) would seriously damage security,
especially in a country where all messages sent and received
(including, especially, encrypted ones) are logged. It's especially
dangerous if a copy of the synchronized database is captured unknown
to either party to the communications channel.
The compiler has its own editor for plaintext preparation for.
encryption which can be done in several ways. The plaintext may be
keyed in, in real time by the editor, saved as an external file in the
current directory and then read in and enciphered straight away or it
may be held over to a later time for later encryption.
Plaintext may be keyed in using batch mode (done at a different time
and place) in some other editor or even in a word processor and
encrypted later as an external file being read in and enciphered as a
stream of plaintext being changed into cipher text.
Plaintext can be keyed in when prompted while the program is in
monochrome mode at run time and encrypted immediately in one lump or
in pieces of say paragraph size that build up to a sizable message.
Files from other storage media can be copied and pasted into the Ada-
Gide editor for encryption.
In general if a character for encryption is keyable it belongs in the
writable subset of ASCII and it can be encrypted, that of course means
anything that can be keyed in at the keyboard can be encrypted.
There are other possibilities but the preferred mode of operation is
to keep it simple and use the compiler editor (Ada-Gide) for all batch
mode files and the email facility in the program run-mode for short
passages like email message construction.
The cipher is easily adaptable to Unicode when this becomes more the
vogue later. There is other cryptography to hand in the same stable
by me (A Modernised One-Time Pad) that is considered more suitable
i.e. with more advantages for Unicode if that comes about. Unicode
may be needed for business with the CJK languages (China, Japan,
Honest appraisal of this scheme by experienced readers would be
- Solo-Crypt Cipher” – Paired User Crypto scheme
- From: adacrypt
- Solo-Crypt Cipher” – Paired User Crypto scheme
- Prev by Date: Re: Solo-Crypt Cipher - Paired User Crypto scheme
- Next by Date: 112-bit prime ECDLP solved
- Previous by thread: Re: Solo-Crypt Cipher - Paired User Crypto scheme
- Next by thread: The next dimension in cryptography; was: Re: Solo-Crypt Cipher” – Paired User Crypto scheme