Re: An Honest and Simple Question.

On 16 Jul., 08:03, adacrypt wrote:
My question is this:  How in general, in modern Western cryptography
is textual data for encryption entered into a computer.

Why don't you try to find this out by yourself ?
Have a look at GPG, TLS, ...

I am speaking of ordinary plaintext from the
character set of printable ASCII.

Character set doesn't matter. "plaintext" (as used in cryptography)
doesn't imply a special encoding (ASCII, Unicode, ...). It just refers
to the *encoded message* with whatever encoding you choose (could be a
GZip-compressed stream of UTF-8 text or a JPEG image).

It's been said already. You're mixing two or three things together
that should have been handeled separately: encoding, encryption,

My own ciphers are designed to 1) handle large-volume secure
communications by reading plaintext in from external batch files and
writing out the ciphertext that emanates from the encryption to
another dedicated external file that may then be transmitted by
electronic means

This is nothing new. See GPG, 7zip, ...

and  2) short impromptu email messages are keyed in
from the keyboard in interactive mode, encrypted, and the ciphertext
is then written to an external file for transmission by electronic

To me this seems the obvious thing to do.  I can’t understand why I am
being admonished to read bytes instead of plaintext as it appears.

I think your confusion comes from the fact that you think "plaintext"
implies human readable text encoded using ASCII. This is not the case.
It's much more convenient to treat your plaintexts and ciphertexts as
sequences of octets -- regardless of their encoding.

What gives here? - adacrypt

I don't know. For some reason you seem to be immune to well-reasoned
criticism. For some reason you seem to think your ciphers are worth
investigating / using.

I guess you should really try to understand why only crazy hobby
cryptographers try to "optimize the OTP". Once you realized that
anything as "safe" as the OTP is as useless you should focus on
current state of the art methods (see block ciphers like AES). You
might also want to take a look at how other applications handle all
this. For example, try to figure out what happens if you use GPG in
its symmetric mode (option "-c").


Relevant Pages

  • Re: Conspiracy in the Surveillance Society
    ... (requiring brute-forcing the ... that the plaintext is independent of the encryption key. ... But the key ain't transfered in the ciphertext. ...
  • Re: Using a Magic Value in Place of Authentication
    ... encryption functions for keys k1 and k2) share a single mapping from a specifc plaintext to a specific ciphertext. ... When did we restrict the plaintext or key of an encryption method to plain English? ...
  • Re: Using a Magic Value in Place of Authentication
    ... the encryption functions for keys k1 and k2) share a single mapping from a specifc plaintext to a specific ciphertext. ... If the attacker had some chosen plaintext, then that would lead to a partial if not a total mapping of the key. ... Of course you could just test a single ciphertext over all possible keys and indeed determine after 2^128 encryptions that it can only be the result of a specific plaintext and key. ...
  • Indistinguishability and integrity in symmetric encryption
    ... "The 'right' security property for general-purpose symmetric encryption". ... >symmetric encryption scheme (for which the empty plaintext is not ... A has interfaces to an encryption oracle ... It is assumed that the ciphertext returned by A is different to all those ...
  • RE: How to verify a decrypted cyphertext
    ... a given ciphertext might decode into several different ... Mathematical encryption might not be the only encoding of the ... Japanese (nothing guarantees that the plaintext will be in English!) ... But in the case of a encrypted random string ...