Started by Baruch, March 23, 2019, 05:34:11 AM
Quote from: Unbeliever on May 30, 2019, 04:55:20 PMSoon we'll have quantum cryptography, which will be inherently unbreakable.
Quote from: Baruch on May 31, 2019, 12:09:29 AMCorrect. The government will have it, you and I will not. But there probably aren't to many organizations, other than national ones, who need that kind of protection. Corporations and individuals can deal with breakable encryption, just like the old wiretap days of rotary phones.
Quote from: Cavebear on May 31, 2019, 11:36:42 AMAny "unbreakable" password will be broken. Ita quod umquam fuerit non habet.
Quote from: Unbeliever on May 30, 2019, 01:23:08 PMAn idiot tried to rob a bank after putting lemon juice all over his face, thinking that because it could be used to make invisible ink it would also make his face invisible! Why a bank robber thought covering himself in lemon juice would help him get away with it:-P :-D
Quote from: Baruch on May 30, 2019, 04:46:42 PMVoicjit - yes, that is a string run thru "my" system. Gets harder the longer the message, usually it gets easier to break with length, because you get better statistics. But statistics won't help much. I had a profession hacker try to break it with his best tools (I gave him only the crypt text, nothing else) and he failed ;-)Basically decryption is looking for correlation patterns. If you work against that in particular, you can make a system as hard as you like (but that isn't enough to make it commercially viable). Basically you first run statistics on individual characters, then on doubles, then on triples until you get to the total length of the message. So the first set of stats have N values equal to the total length, and the final stat has just one value. That is looking at letters just sequentially (there are other choices, like every other letter).
Quote from: Baruch on June 01, 2019, 06:50:02 PMIt would appear we have a professional in our midst!!There are exactly 36 possible characters, 0-9 and A-ZThe arithmetic is modular (of course). Aside from the key itself, it is mod36 (of course).The key (almost pure random) is not mod36. That would create unnecessary "depth" via aliasing.The key is muxed with the message, by base36 addition, but dynamically, not statically.There is in addition, when converting character back and forth with base36 â€¦ a constant re-lettering vector (sticker per Enigma) for all 36 characters.The initial offset is simply the effect of adding the first key character to the first message character, there is no other offset.
Quote from: viocjit on June 03, 2019, 01:40:19 PMWhy do you say I'm a professional ?I know only a few things in crypto. I don't know the mathematical details in each concept.