# Re: Is there a Mathematician Cryptographr in the House.

*From*: Mok-Kong Shen <mok-kong.shen@xxxxxxxxxxx>*Date*: Mon, 19 Jul 2010 22:46:08 +0200

adacrypt wrote:

Mok-Kong Shen wrote:[snip]

Sorry that at least one more iteration step is needed and I have to

ask a bunch of dumb questions.

Likewise I had better proceed carefully lest there be any damning

misundesrtanding that could scupper the good work - I will take each

point it one at a time'

1) The partners have agreed on two secret character strings (let's

name them S1 and S2) each of length 14250.

Yes but this needs explaining. S1 is made up of characters per se and

comprises a multiple ('m' say) of the basic set of the 95 printable

characters of ASCII - it is engineered by first reading in the

plaintext file for encryption and counting the number of characters

in it - this number is then used to determine 'm' explicitly as the

number of round modules of keys from ASCII that will be needed to

encrypt the file of plaintext when they are combined into one set - it

is unlikely that the message length is an exact multiple of the 95

element set so in order to satisfy the caveat that message length and

key length are equal the message is made up by padding with repeats of

some character (like this<<<<) until they are both the same length.

So S1 is not a fixed (i.e. same for all messages) string but is

dependent in some way on the particular message to be processed? Say,

the particular (padded if needed) message has a length L that is a

multiple of 95. How does one do the "engineering" you mentioned? Is it

correct that there is some "raw" secret material SR1 of length 14250

that is fixed and one derives from SR1 a message specific S1 for use?

If yes, how is S1 obtained from SR1?

S2 is a set of positive integers but within the stipulated range (X

+127) and 2(X +32) - this set is a fixed length and the elements

being consecutive positive integers are non-repeating) - happily,

subsets of this random set (i.e. in lengths required by shorter

messages) are also random themselves and only part of the set can

safely be used as the random set that is equal to the messagelength.

You wrote:

‘N’ belongs in the range (X +127) to 2(X+32) i.e. 14440 to 28690.

So S2 consists of N's? Right? Is S2 (for use for a particular message)

of length L or of length 14250? Is it correct that different messages

use different S2? Is S2 for use for a particular message derived

from a "raw" secret material SR2 of length 14250 which is fixed? How

does one derive that?

You will appreciate my great care in preserving randomness.

Important: Both sets S1 and S2 are each simply one permutation that

is possible in the enormous permutation space that is available for

both of them. For instance inthe case of S1 the permutation space of

m modules of 95 is 95! ^m (95 factorial to the power of m) which is an

out-of-this-world large number.

In the case of S2 the permutation space is 14250! (14250 factorial) an

even larger number.

It seems that some permutation processing is involved in what I mention

as "derivations" above. Could you tell concretely the algorithm of

permutation that is used, i.e., given L, how does one exactly obtain S1

and S2 from SR1 and SR2?

Important: The two sets S1 and S2 are scrambled by a special computer

procedure that requires some understanding by programmers - elements

are swopped around positionally - also the arrays are sliced i.e. the

starting point at which the computer starts reading the keys from

either array is changed each time. All of this is to keep on

reinforcing the randomness and to guard against transparency of keying

data in the mutual databases. Alice decides how the arrays will be

shuffled and sliced and directs Bob to do the same thing exactly - it

works a treat.

This doesn't further help much my understanding. I understand that a

secret (kind of key-dependent) permutation does some desired

scrambling. As said above, I like to know how you concretely do the

permutations in obtaining S1 and S2 from SR1 and SR2.

I strongly suggest that you mull over this for some time before going

any further - I am here any time you are ready to move on but give

this some thought - This is a very difficult piece of the algoritm.

That's why I have to ask the many questions above.

(2) One may repeatedly use S1 and S2, e.g. one could use them to sendYes but remember to scramble and slice regulary so as to keep a high

10000 messages of 10000 characters.

level of entanglement that underwrites the randomnes of the key sets.

If my view above of "dynamically" deriving S1 and S2 from SR1 and SR2 is

right, then I have understood this.

(3) X, chosen above satisfying the criterion, is fixed, i.e. constant

for 'all' messages to be sent in future.

I explained that there are two options here, you can X as a constant

So either

(a) X is a constant (agreed upon at the same time as SR1 and SR2) for

all messages, or

(b) X is different for different messages but its value doesn't vary

throught one and the same message (i.e. a constant for each

particular message).

Is that right? How is X chosen by the partners in case (b)? Presumably

using (a) is much weaker than (b). Is (a) permissible at all or do

you consider it to be nonetheless quire safe because of the other

operations present, in particular the permutations mentioned above?

Thanks.

M. K. Shen

.

**Follow-Ups**:**Re: Is there a Mathematician Cryptographr in the House.***From:*adacrypt

**References**:**Is there a Mathematician Cryptographr in the House.***From:*adacrypt

**Re: Is there a Mathematician Cryptographr in the House.***From:*adacrypt

**Re: Is there a Mathematician Cryptographr in the House.***From:*Mok-Kong Shen

**Re: Is there a Mathematician Cryptographr in the House.***From:*adacrypt

**Re: Is there a Mathematician Cryptographr in the House.***From:*Mok-Kong Shen

**Re: Is there a Mathematician Cryptographr in the House.***From:*adacrypt

**Re: Is there a Mathematician Cryptographr in the House.***From:*Mok-Kong Shen

**Re: Is there a Mathematician Cryptographr in the House.***From:*adacrypt

**Re: Is there a Mathematician Cryptographr in the House.***From:*Mok-Kong Shen

**Re: Is there a Mathematician Cryptographr in the House.***From:*adacrypt

**Re: Is there a Mathematician Cryptographr in the House.***From:*Mok-Kong Shen

**Re: Is there a Mathematician Cryptographr in the House.***From:*adacrypt

- Prev by Date:
**Re: Is there a Mathematician Cryptographr in the House.** - Next by Date:
**Re: Is there a Mathematician Cryptographr in the House.** - Previous by thread:
**Re: Is there a Mathematician Cryptographr in the House.** - Next by thread:
**Re: Is there a Mathematician Cryptographr in the House.** - Index(es):