Re: Customised Extra Entanglement in Vector Cryptography.



I suspect you are cheating (again).

This "Option 5" business is not part of the original
cipher and challenge; in fact you clearly stated, on
numerous occasions that the parameters were public
information and that changing them on different
invocations was sufficient to safeguard the cypher.

M

On 22/10/2011 11:29, adacrypt wrote:
On Oct 22, 10:03 am, Mark Murray<w.h.o...@xxxxxxxxxxx> wrote:
On 22/10/2011 09:53, adacrypt wrote:

Does he want more? he only has to say so. - adacrypt

He already did.

M
--
Mark "No Nickname" Murray
Notable nebbish, extreme generalist.

Files you asked for.‏


Austin O'Byrne


Austin O'Byrne
austin.obyrne@xxxxxxxxxxx

Change picture
View profile
To pmarques@xxxxxxxxxxxx
From: Austin O'Byrne (austin.obyrne@xxxxxxxxxxx)
Sent: 22 October 2011 10:17:58
To: pmarques@xxxxxxxxxxxx
Hotmail Active View


5 attachments (total 580.5 KB)


PlainText...dat
Download(4.7 KB)

CipherTex...dat
Download(151.6 KB)

PlainText...dat
Download(10.9 KB)

CipherTex...dat
Download(350.1 KB)

CipherTex...dat
Download(63.2 KB)
Download all as zip
Hi,

Herewith the files you asked for again. Each File has the information
"Option 5" accompanying it - this is the only information that Bob
will get from Alice by way of parameter passing instructions - that
means that the adversary that you are simulating gets this information
also and no more.

Recapping: You said two plaintextfiles and the associated ciphertext
files + a cipheretext file which you will then cryptanalyse.

Herewith,
1) PlaintextFile_4000.dat
CipherTextFile_4000.dat
2) PlainTextFile_10000.dat
CipherTextFile_10000.dat
3) PlainTextFile_2000.dat


- adacrypt


New
|
Reply
Reply all
Forward
|
Delete
Mark this folder as read
Empty this folder
Mark

Done again - adacrypt


--
Mark "No Nickname" Murray
Notable nebbish, extreme generalist.
.