Re: Customised Extra Entanglement in Vector Cryptography.



On Oct 22, 9:50 am, Mark Murray <w.h.o...@xxxxxxxxxxx> wrote:
On 22/10/2011 07:56, adacrypt wrote:

Consider now the brash claim by one reader that he can cryptanalyse
ciphertext from a provided set of plaintext and the corresponding set
of ciphertext in this cryptography using standard old fashioned
methods ! -  what a hope when there are 30000 possibilities of cipher
text sets to send him for the one set of plaintext being sent to him
concurrently.  That is to say nothing of the different mathematics and
algorithm - its like suggesting that model T Ford experience is
sufficient to service a modern racing machine like "Red  Bull"
formula_1  cars or "Ferraris"

Send him the ciphertexts he has asked for. Put up or shut up.

  He hasn’t taken the trouble to understand this cryptography and
instead argues he can just use outdated One-Time Pad logic.

Put up or shut up. Give him the ciphertext. Stop talking about it.

I can’t get him to come out of the ladies toilet to confront him with
some samples of plaintext and cipher text to see him demonstrate his
claims.

Last time he asked you for somthing you ran away and refuse to give
him anything. You scared he might break your cipher?

Its easy; encrypt some files as if you were both Bob and Alice, and
publish the ciphertexts and cleartext parameters here on sci.crypt,
making all readers here Eve. If you cipher is good, it will stand up
to this.

M
--
Mark "No Nickname" Murray
Notable nebbish, extreme generalist.

He was sent the files he asked for then.

Does he want more? he only has to say so. - adacrypt
.



Relevant Pages

  • Vigenere++ Proposal of a (new?) cipher
    ... additional ciphertext shuffling phase. ... which is a fast hash function with a low collision rate and the Mersenne ... plaintext, "C" to indicate the i-th letter of the ciphertext and ... For each character of index "i" of the plaintext: ...
    (sci.crypt)
  • Re: How to cryptanalysis of Japanese PURPLE cipher machine.
    ... I have a question about PURPLE. ... > PURPLE ciphertext in September 1940 and intervals revealed the ... already completely broken the "sixes" -- early-on frequency counts ... great deal of matched plaintext and ciphertext. ...
    (sci.crypt)
  • Chosen plain text attack on Chaocipher
    ... Submit the plaintext for encipherment ... Assume left wheel is OUHJTGLXAIEMKWVZQRPBSNYFCD and right wheel is ... Note the ciphertext we got: ... It is a repetition of the same 14 letters. ...
    (sci.crypt)
  • Re: Passwords et al.
    ... with cheapness of memory and indeed the relative cheapness of computer ... power itself compared with the early days of cryptography when an ... In order to avoid ciphertext-appearance matching attacks, ie attacks based on a plaintext always encrypting as the same ciphertext, we often use things like IVs in modes like CBC which increase CT length. ...
    (sci.crypt)
  • Re: Passwords et al.
    ... On 07/07/12 01:45, Peter Fairbrother wrote: ... power itself compared with the early days of cryptography when an ... S/MIME tend to produce ciphertext that's actually smaller than ... the plaintext. ...
    (sci.crypt)