Re: The Most Profound Distillation of the Feedack from Modern Cyptography.
 From: David Eather <eather@xxxxxxxxxx>
 Date: Wed, 28 Sep 2011 14:41:13 +1000
On 22/09/2011 9:54 PM, adacrypt wrote:
The practice of taking counting numbers represented by the traditional
numberline, currently being taken as the operands of cryptographic
ciphers must be discontinued and never again be used as such, if
computerindependent cryptography is ever to be realised. No matter
how sophisticated the mathematics that uses these operands it will
always be possible to brute force the resultant ciphertext because of
the initial transparency of the operands – think about it.
 adacrypt
I'm trying.
On page one of
http://www.adacrypt.com/downloads/Joint%20PDF%20%20A%20worked%20example%20of%20Vector%20Cryptography%20at%20work%20&%20Theory%20of%20Factoring%20of%20Vectors.pdf
"Alice chooses a line in the plane defined by "N" (one of four available lines)
Where do these four lines come from?
David Eather
.
 FollowUps:
 References:
 Prev by Date: Re: The Most Profound Distillation of the Feedack from Modern Cyptography.
 Next by Date: Re: The Most Profound Distillation of the Feedack from Modern Cyptography.
 Previous by thread: Re: The Most Profound Distillation of the Feedack from Modern Cyptography.
 Next by thread: Re: The Most Profound Distillation of the Feedack from Modern Cyptography.
 Index(es):
Relevant Pages
