Mega Search
23.2 Million


Sign Up

Make a donation  
Crypto App_1 Cipher_1 - Personalized Cryptography for Home C  
News Group: comp.lang.ada

Further to my earlier recent post "In the Pipe Line" announcement this cipher is now ready for downloading.

http://www.adacryptpages.com 

Please look for this title box - in the lower RH corner.

"Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography for Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8. OS"

The down load contains,

1) Program source code in Ada-95
2) Comprehensive User Guide
3) Ada gnat 311.p compiler for ready-to-use installing - user  convenience.

Note. - this cipher is downloadable by all and sundry with my best wishes.

You may decide to use this cipher in many ways from just securing your information at home or in out-of-office situations. 

However,

For NETWORKING - i.e. setting up secure loops (channels) with other entities.

The copy you have down-loaded must be configured uniquely by you (in a few easy steps as described here). You then record and keep this program (associated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) to your client 'Bob'(you being the sending entity 'Alice' - industry standard pseudonyms). 

Configuring
Please locate this piece of the sourcecode below in each of these main programs "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENCRYPTIONS_MARK_0" program. 

FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS
    NumOut: Integer;

BEGIN --Compose_CipherText_Items;

CASE NumIn IS
   
   WHEN 1 => NumOut:= Pn(1)+ Hash_2(Count); -- these
   WHEN 2 => NumOut:= Pn(2)+ Hash_11(Count);
   WHEN 3 => NumOut:= Pn(3)+ Hash_12(Count);
          WHEN OTHERS =>
    Ada.Text_IO. Put (Item => "Forget it ");
  END CASE;
  RETURN NumOut;

END Compose_CipherText_Items;

*The focus is on the key information 'Hash_n' above.

Note :- there are 12 distinct Hash programs available within the software program arrays and taken 3 at a time this enables 12!(factorial)/3!(factorial) different permutations of settings => The Ada 'Case' Package  may therefore have close on 80 million distinct Hash settings. - Choose one permutation as above and insert this into the programs NAMED in capitals above- this configures your software uniquely.

Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" please find these lines and make the exact same changes as you did in the other programs.

  Pn(1):= W(1) - Hash_2(Count);  -- change these also
  Pn(2):= W(2) - Hash_11(Count); 
  Pn(3):= W(3) - Hash_12(Count);

When all of this is done the two configured softwares will be identical and will comprise the "Mutual Databases" described in the User-Guide.
 
You can do this as often as you wish and create as many secure loops with other people as you like (before I call time on the copyright (much later) - maybe !.)

*Important - You should immediately test your configuration changes by test-running the prepared batch files of plaintext that are provided. => Encrypt and immediately Decrypt at least some of the test files as well as also simulating a trial 'Email' program.

Note also, in addition to this (i.e. uniquely configuring mutual databases) you can still configure the installed 'Key Pad' in the open source code Ada-95 program as often as you think fit in interim daily encryption work sessions .

As long as the entities keep their mutual databases safe from common criminal theft (ordinary good housekeeping) you can enjoy perfect secrecy of communications for evermore.

The ciphertext string is a string of large (7 digits) integers and it travels from Alice to Bob as a pasted attachment to an unsecured email.  Periodic parameter changes  in the 'Ked Pad' may go unsecured also (but you may prefer them encrypted - so be it also).

Enjoy,

I can be contacted on this URL :- austin.obyrne@hotmail.com

adacrypt.

          ----------------------------------------------------------





Vote for best question.
Score: 0  # Vote:  0
Date Posted: 28-Aug-2014, at 7:09 AM EST
From: m
 
Re: Crypto App_1 Cipher_1 - Personalized Cryptography for Ho  
News Group: comp.lang.ada
On Thu, 28 Aug 2014 07:09:10 -0700, austin.obyrne769 wrote:

> http://www.adacryptpages.com

What is your background in the design and implementation of cryptosystems? 
I ask this because my sole knowledge of cryptosystems is that it's very 
hard to get right, and very easy to make simple mistakes which render a 
cypher much easier to break than anyone believes, and that developing 
such systems is thus probably best left to real experts.

-- 
Denis McMahon, denismfmcmahon@gmail.com

Vote for best answer.
Score: 0  # Vote:  0
Date Posted: 28-Aug-2014, at 4:46 PM EST
From: Denis McMahon
 
Re: Crypto App_1 Cipher_1 - Personalized Cryptography for Ho  
News Group: comp.lang.ada
On Thursday, August 28, 2014 3:09:10 PM UTC+1, austin.o...@btinternet.com wrote:
> Further to my earlier recent post "In the Pipe Line" announcement this cipher is now ready for downloading.
> 
> 
> 
> http://www.adacryptpages.com 
> 
> 
> 
> Please look for this title box - in the lower RH corner.
> 
> 
> 
> "Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography for Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8.. OS"
> 
> 
> 
> The down load contains,
> 
> 
> 
> 1) Program source code in Ada-95
> 
> 2) Comprehensive User Guide
> 
> 3) Ada gnat 311.p compiler for ready-to-use installing - user  convenience.
> 
> 
> 
> Note. - this cipher is downloadable by all and sundry with my best wishes..
> 
> 
> 
> You may decide to use this cipher in many ways from just securing your information at home or in out-of-office situations. 
> 
> 
> 
> However,
> 
> 
> 
> For NETWORKING - i.e. setting up secure loops (channels) with other entities.
> 
> 
> 
> The copy you have down-loaded must be configured uniquely by you (in a few easy steps as described here). You then record and keep this program (associated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) to your client 'Bob'(you being the sending entity 'Alice' - industry standard pseudonyms). 
> 
> 
> 
> Configuring
> 
> Please locate this piece of the sourcecode below in each of these main programs "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENCRYPTIONS_MARK_0" program. 
> 
> 
> 
> FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS
> 
>     NumOut: Integer;
> 
> 
> 
> BEGIN --Compose_CipherText_Items;
> 
> 
> 
> CASE NumIn IS
> 
>    
> 
>    WHEN 1 => NumOut:= Pn(1)+ Hash_2(Count); -- these
> 
>    WHEN 2 => NumOut:= Pn(2)+ Hash_11(Count);
> 
>    WHEN 3 => NumOut:= Pn(3)+ Hash_12(Count);
> 
>           WHEN OTHERS =>
> 
>     Ada.Text_IO. Put (Item => "Forget it ");
> 
>   END CASE;
> 
>   RETURN NumOut;
> 
> 
> 
> END Compose_CipherText_Items;
> 
> 
> 
> *The focus is on the key information 'Hash_n' above.
> 
> 
> 
> Note :- there are 12 distinct Hash programs available within the software program arrays and taken 3 at a time this enables 12!(factorial)/3!(factorial) different permutations of settings => The Ada 'Case' Package  may therefore have close on 80 million distinct Hash settings. - Choose one permutation as above and insert this into the programs NAMED in capitals above- this configures your software uniquely.
> 
> 
> 
> Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" please find these lines and make the exact same changes as you did in the other programs.
> 
> 
> 
>   Pn(1):= W(1) - Hash_2(Count);  -- change these also
> 
>   Pn(2):= W(2) - Hash_11(Count); 
> 
>   Pn(3):= W(3) - Hash_12(Count);
> 
> 
> 
> When all of this is done the two configured softwares will be identical and will comprise the "Mutual Databases" described in the User-Guide.
> 
>  
> 
> You can do this as often as you wish and create as many secure loops with other people as you like (before I call time on the copyright (much later) - maybe !.)
> 
> 
> 
> *Important - You should immediately test your configuration changes by test-running the prepared batch files of plaintext that are provided. => Encrypt and immediately Decrypt at least some of the test files as well as also simulating a trial 'Email' program.
> 
> 
> 
> Note also, in addition to this (i.e. uniquely configuring mutual databases) you can still configure the installed 'Key Pad' in the open source code Ada-95 program as often as you think fit in interim daily encryption work sessions .
> 
> 
> 
> As long as the entities keep their mutual databases safe from common criminal theft (ordinary good housekeeping) you can enjoy perfect secrecy of communications for evermore.
> 
> 
> 
> The ciphertext string is a string of large (7 digits) integers and it travels from Alice to Bob as a pasted attachment to an unsecured email.  Periodic parameter changes  in the 'Ked Pad' may go unsecured also (but you may prefer them encrypted - so be it also).
> 
> 
> 
> Enjoy,
> 
> 
> 
> I can be contacted on this URL :- austin.obyrne@hotmail.com
> 
> 
> 
> adacrypt.
> 
> 
> 
>           ----------------------------------------------------------

I have accidentally overstated the permutation space . It should read 12!/(12 -3)! or 1320 - this is still quite Ok.

adacrypt

Vote for best answer.
Score: 0  # Vote:  0
Date Posted: 28-Aug-2014, at 9:31 AM EST
From: Austin Obyrne
 
Re: Crypto App_1 Cipher_1 - Personalized Cryptography for Ho  
News Group: comp.lang.ada
On Thursday, August 28, 2014 3:09:10 PM UTC+1, austin.o...@btinternet.com wrote:
> Further to my earlier recent post "In the Pipe Line" announcement this cipher is now ready for downloading.
> 
> 
> 
> http://www.adacryptpages.com 
> 
> 
> 
> Please look for this title box - in the lower RH corner.
> 
> 
> 
> "Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography for Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8.. OS"
> 
> 
> 
> The down load contains,
> 
> 
> 
> 1) Program source code in Ada-95
> 
> 2) Comprehensive User Guide
> 
> 3) Ada gnat 311.p compiler for ready-to-use installing - user  convenience.
> 
> 
> 
> Note. - this cipher is downloadable by all and sundry with my best wishes..
> 
> 
> 
> You may decide to use this cipher in many ways from just securing your information at home or in out-of-office situations. 
> 
> 
> 
> However,
> 
> 
> 
> For NETWORKING - i.e. setting up secure loops (channels) with other entities.
> 
> 
> 
> The copy you have down-loaded must be configured uniquely by you (in a few easy steps as described here). You then record and keep this program (associated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) to your client 'Bob'(you being the sending entity 'Alice' - industry standard pseudonyms). 
> 
> 
> 
> Configuring
> 
> Please locate this piece of the sourcecode below in each of these main programs "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENCRYPTIONS_MARK_0" program. 
> 
> 
> 
> FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS
> 
>     NumOut: Integer;
> 
> 
> 
> BEGIN --Compose_CipherText_Items;
> 
> 
> 
> CASE NumIn IS
> 
>    
> 
>    WHEN 1 => NumOut:= Pn(1)+ Hash_2(Count); -- these
> 
>    WHEN 2 => NumOut:= Pn(2)+ Hash_11(Count);
> 
>    WHEN 3 => NumOut:= Pn(3)+ Hash_12(Count);
> 
>           WHEN OTHERS =>
> 
>     Ada.Text_IO. Put (Item => "Forget it ");
> 
>   END CASE;
> 
>   RETURN NumOut;
> 
> 
> 
> END Compose_CipherText_Items;
> 
> 
> 
> *The focus is on the key information 'Hash_n' above.
> 
> 
> 
> Note :- there are 12 distinct Hash programs available within the software program arrays and taken 3 at a time this enables 12!(factorial)/3!(factorial) different permutations of settings => The Ada 'Case' Package  may therefore have close on 80 million distinct Hash settings. - Choose one permutation as above and insert this into the programs NAMED in capitals above- this configures your software uniquely.
> 
> 
> 
> Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" please find these lines and make the exact same changes as you did in the other programs.
> 
> 
> 
>   Pn(1):= W(1) - Hash_2(Count);  -- change these also
> 
>   Pn(2):= W(2) - Hash_11(Count); 
> 
>   Pn(3):= W(3) - Hash_12(Count);
> 
> 
> 
> When all of this is done the two configured softwares will be identical and will comprise the "Mutual Databases" described in the User-Guide.
> 
>  
> 
> You can do this as often as you wish and create as many secure loops with other people as you like (before I call time on the copyright (much later) - maybe !.)
> 
> 
> 
> *Important - You should immediately test your configuration changes by test-running the prepared batch files of plaintext that are provided. => Encrypt and immediately Decrypt at least some of the test files as well as also simulating a trial 'Email' program.
> 
> 
> 
> Note also, in addition to this (i.e. uniquely configuring mutual databases) you can still configure the installed 'Key Pad' in the open source code Ada-95 program as often as you think fit in interim daily encryption work sessions .
> 
> 
> 
> As long as the entities keep their mutual databases safe from common criminal theft (ordinary good housekeeping) you can enjoy perfect secrecy of communications for evermore.
> 
> 
> 
> The ciphertext string is a string of large (7 digits) integers and it travels from Alice to Bob as a pasted attachment to an unsecured email.  Periodic parameter changes  in the 'Ked Pad' may go unsecured also (but you may prefer them encrypted - so be it also).
> 
> 
> 
> Enjoy,
> 
> 
> 
> I can be contacted on this URL :- austin.obyrne@hotmail.com
> 
> 
> 
> adacrypt.
> 
> 
> 
>           ----------------------------------------------------------

Correction : the permutation space IS NOT 12!/3! but instaed is 12!/(12 -3)! or 12 * 11 *10 = 1320.  Its OK to configure uniquely taking into account (or not) the other independent scrambling parameters.

adacrypt

Vote for best answer.
Score: 0  # Vote:  0
Date Posted: 28-Aug-2014, at 9:00 AM EST
From: Austin Obyrne