Adacrypt.com Website.



The “adacrypt.com” website at http://www.adacrypt.com has been rationalised now as “adacryptpages.com” at http://www.adacryptpages.com . Both sites will exist for the convenience of users in the future.

This cryptography is variously being called “Displacement Cryptography”, “Vector Cryptography” and “ Skew Line Encryptions” for the simple reason that these are all related things that fit either description.

This cryptography is a radical change from the norm of scalar cryptography that uses the universal number line to model numbers and it enables claims to be made for the ultimate class of “Theoretically Unbreakable” cryptographic strength for this new form of encryption.

Displacement cryptography evolves from my invention of a new topic in mathematics called “Vector Factoring”. It is intended for operation by non-specialist users who need no knowledge of cryptography, mathematics or programming and who require nothing more than basic keyboarding skills to be able to do email encryptions and batch encryptions of large, externally prepared files of plaintext.

Readers are invited to download any of the software on offer.

Beat the rising Orwellian trend – Big Brother is watching! – secure your important emails every time – encrypting them may be the only solution.

:http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1

In this cryptography numbers are modelled as wildly disparate points in space unlike the traditional model of an arbitrary straight line i.e. the 'universal number line' that is so transparent as an encryption domain that it will never be possible to completely obfuscate the plaintext when it is transformed into ciphertext – this defect is endemic in all ‘scalar’ cryptography no matter how ingenious the encryption transformation my be – the transparency is just simply indelible for all time.

Enjoy.

“Popular Cryptography Magazine “ please copy.

- adacrypt




.



Relevant Pages

  • Re: [OT]? Recovering a password from a client application
    ... Administrator and physical access to a machine, ... A secure system would require the user to enter their password each ... as emails, passwords to other services etc. Modern ciphers such as ... with all your sensitive data and passwords in plain sight. ...
    (comp.mail.misc)
  • Re: McDo 07-08 f/t
    ... BIG BROTHER IS WATCHING YOU, the caption said, while the dark eyes looked ...
    (rec.audio.car)
  • Followup on attempt to reach BLUMENBERG Relative
    ... Some of you may remember the contact I made on "BLUMENBERG" who married into my EISEN family. ... We discovered that my grandfather's sister married his grandmother's brother. ... He then stopped responding, and despite three follow-up emails, I never heard another word. ... REISS, NOVEMBER - Nagyvarad ...
    (soc.genealogy.jewish)
  • Re: Legs Wide Shut
    ... Clooney's in O' Brother and Intolerable Cruelty. ... mainly a vehicle for an ageing Bill Murray to do that ageing Bill Murray ... watching it, ... Well worth another watch. ...
    (uk.sport.football)
  • Re: STILL OT - back to the name thing Re: OT: I have aquestionfor you.
    ... In many ways I much prefer to do my shopping ... I was watching "Big Brother" late last night and it`s amazing - every ... What that was leading up to was the fact that movies seem to get more ... I watched Big Brother once for about ten minutes and Mark and I looked ...
    (rec.crafts.textiles.needlework)