From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.236.180.202 with SMTP id j50mr4208454yhm.51.1409034916517; Mon, 25 Aug 2014 23:35:16 -0700 (PDT) X-Received: by 10.140.86.106 with SMTP id o97mr1484qgd.25.1409034916458; Mon, 25 Aug 2014 23:35:16 -0700 (PDT) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.glorb.com!m5no3194455qaj.0!news-out.google.com!j6ni8038qas.0!nntp.google.com!m5no3194454qaj.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Mon, 25 Aug 2014 23:35:16 -0700 (PDT) Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=5.81.69.184; posting-account=j15vhwoAAABH_eywb4s2_dWxAM2kkx7W NNTP-Posting-Host: 5.81.69.184 User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <077c3724-0a8e-41ba-b01f-c81fe92fe3a8@googlegroups.com> Subject: In the pipeline. From: austin.obyrne769@btinternet.com Injection-Date: Tue, 26 Aug 2014 06:35:16 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Xref: news.eternal-september.org comp.lang.ada:21920 Date: 2014-08-25T23:35:16-07:00 List-Id: Thanks to every body for your help in the matter of integer overflow. The = solutions you gave me do not need to be implemented nor is there any danger= of it happening uncontrollably because I have decided that my already up-r= unning robust data validation program preempts any problem arising in any c= ase. =20 It is important to me to make this clear to reader because I have two very = good Ada driven ciphers coming out soon. This is personalized cryptography on a hand-held device for the uninitiated= masses of home computer users who do not need to know anything about the c= ryptography or the mathematics that under pins it or indeed the programming= language being used to convey it as a cipher. This comes about from the convenience to me of being able to load Ada compi= lers on a Microsoft Surface Pro 2 tablet (Pro 3 comes out today). The upsh= ot is that the so-called euphemistic man/woman 'in the street' can now have= theoretically unbreakable security of communications as a world first (apa= rt from the trivial One-Time pad) that even the NSA does not have. This st= ymies the NSA from shamefully purloining peoples' privacy. It can be demonstrated before the most rigorous mathematical adjudicators t= hat both of these ciphers are in the ultimate class of "Theoretically Unbre= akable" cryptographic strength. The ciphers have an encryption/decryption r= ate of 30,000 characters per second on a typical home computer which is mor= e than sufficient for most individuals. It is a very useful thing also to be able to achieve perfect secrecy of com= munications and secure storage as a second attribute on a hand-held device = in out-of-office scenarios. The discussion on integer overflow was largely for my education. * there is no problem in practice. I repeat that Ada is the ideal language for cryptography work in my view an= d it is very convenient and gratifying to me after fifteen years of hard wo= rk to know that this Microsoft tablet can host such a powerful tool as an u= nbreakable cipher running in Ada-95 on a handheld device (Ian Flemming's 'M= ' could have conceived the idea even) - *it will load the older gnat 311.p = that I use also. The Apple i-pad probably does all this also I expect?. Thanks again to every body - I am taking it that user-defined very large in= tegers > 2^31 -1 in yesterday's discussion is only feasible in a 64-bit env= ironment - there is no problem with that. adacrypt