comp.lang.ada
 help / color / mirror / Atom feed
* ASLEC Cipher Download
@ 2018-05-15 15:36 Austin Obyrne
  0 siblings, 0 replies; only message in thread
From: Austin Obyrne @ 2018-05-15 15:36 UTC (permalink / raw)


This crosspost is justified in my view in that it is Ada language intensive and may be of interest to some group readers. It has been many years in the making and may soon get some recognition by the crypto establishment. 

This cipher is available for downloading now. 

http://www.adacrypt.co.uk/

User Guide;

Download the cipher and documents folders and install the gnat compiler to a computer.

There are 9 prepared text files varying from 1 to 30000 characters in the downloaded work folder that the  user may use to verify the cipher operation.

The download comes with the particular test file  that is titled "PlainTextFile_30000.dat" - this is already prepared for running in accordance with this verified (crucially important ) KeyPad variable setting that is used to scramble the finished ciphertext string.

Please find this elemental item in the main KeyPad.
It looks like this :-
   
  SliceNum_26  : CONSTANT Integer := 0   ; --Start point in slice   
  StepNum_26   : CONSTANT Integer := 36  ; --Upstream placemoves   
  RepeatsNum_26: CONSTANT Integer :=2624 ; --repeats of shift instruction  
  -- scrambling device in ''Load_n_Scramble_CipherTexts'' procedure 
  -- (SliceNum_26 + stepNum_26*RepeatsNum_26 <= Current number of ciphertext items.

The salient thing here is the pair of integers (36, 2624) in the KeyPad, please find and identify these integers.  They are one of a larger possibility space of other verified parameters pairs that are there for the finding (see documentsts item).

An identical pair appears also in the corresponding block in the companion program that is titled "General_Decryption_Program_Mark_0001", that program is used to decrypt the ciphertext emanating from the first program.

The user can successfully run these two programs one after the other i.e"Batch_Encryption_Program_Mark_0001" first and its co-program "General_Decryption_Program_Mark_0001" next as a pair.  

Using this particular file and this particular KeyPad setting will verify the program authenticity by enabling the user to gauge the accurate reversibility of the previously scrambled ciphertext  by decrypting it and then studying the accuracy of the decrypted messagetext.

The user might next try an alternative pair of  parameters in the same place in the same KeyPad block again to double-check the program i.e. this time the pair (19, 4973) will be used, these parameters have also been verified by me before the download took place but let the reader check this out for themselves by keying them in and running the programs once more.  Clearly, the proof of success of the scrambling ploy is that the ciphertext created in the first program, the encryption program,  decrypts successfully in the second program while being totally and inextricably diffused to all adversaries who might intercept it while it is in transit between the entities. 

Just one more trial parameter pair for good luck.  The pair  (72, 1312) has also been verified by test running them in the same programs prior to downloading but the user may want to check the computation of this pair again for one's own satisfaction.

Note : There are at least  30000 other pairs of  parameters (i.e. for this particular plaintext file called "PlaintextFile_30000.dat") that should all be in perfect order for using in this scrambling device but they should each be verified as a matter of good practice before use by readers.

In general, the scope of the parameters selection domain is always a simple function of the message-length.

Having initially verified  the "PlainTextFile_30000.dat" item the reader might next want to check out the other test files also in the same way i.e. files containing 1 - 10000 characters in the same downloaded folder.

Please note:- This is NOT free software by any definition of the word free, it is instead copyright registered in my name. 

Austin O'Byrne

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2018-05-15 15:36 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-05-15 15:36 ASLEC Cipher Download Austin Obyrne

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox