From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 2002:a6b:f49:: with SMTP id x70-v6mr18281580ioi.107.1526398617483; Tue, 15 May 2018 08:36:57 -0700 (PDT) X-Received: by 2002:a9d:24a1:: with SMTP id z30-v6mr1138600ota.4.1526398617280; Tue, 15 May 2018 08:36:57 -0700 (PDT) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!feeder.eternal-september.org!weretis.net!feeder4.news.weretis.net!proxad.net!feeder1-2.proxad.net!209.85.166.216.MISMATCH!v8-v6no232899itc.0!news-out.google.com!f20-v6ni4350itd.0!nntp.google.com!v8-v6no232897itc.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Tue, 15 May 2018 08:36:57 -0700 (PDT) Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=2a00:23c0:8880:ae00:9571:3a9a:fce6:bdc1; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg NNTP-Posting-Host: 2a00:23c0:8880:ae00:9571:3a9a:fce6:bdc1 User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <0ed84644-f927-4d1e-b6fe-0328063e9a03@googlegroups.com> Subject: ASLEC Cipher Download From: Austin Obyrne Injection-Date: Tue, 15 May 2018 15:36:57 +0000 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Xref: reader02.eternal-september.org comp.lang.ada:52358 Date: 2018-05-15T08:36:57-07:00 List-Id: This crosspost is justified in my view in that it is Ada language intensive= and may be of interest to some group readers. It has been many years in th= e making and may soon get some recognition by the crypto establishment.=20 This cipher is available for downloading now.=20 http://www.adacrypt.co.uk/ User Guide; Download the cipher and documents folders and install the gnat compiler to = a computer. There are 9 prepared text files varying from 1 to 30000 characters in the d= ownloaded work folder that the user may use to verify the cipher operation= . The download comes with the particular test file that is titled "PlainText= File_30000.dat" - this is already prepared for running in accordance with t= his verified (crucially important ) KeyPad variable setting that is used to= scramble the finished ciphertext string. Please find this elemental item in the main KeyPad. It looks like this :- =20 SliceNum_26 : CONSTANT Integer :=3D 0 ; --Start point in slice =20 StepNum_26 : CONSTANT Integer :=3D 36 ; --Upstream placemoves =20 RepeatsNum_26: CONSTANT Integer :=3D2624 ; --repeats of shift instruction= =20 -- scrambling device in ''Load_n_Scramble_CipherTexts'' procedure=20 -- (SliceNum_26 + stepNum_26*RepeatsNum_26 <=3D Current number of ciphert= ext items. The salient thing here is the pair of integers (36, 2624) in the KeyPad, pl= ease find and identify these integers. They are one of a larger possibilit= y space of other verified parameters pairs that are there for the finding (= see documentsts item). An identical pair appears also in the corresponding block in the companion = program that is titled "General_Decryption_Program_Mark_0001", that program= is used to decrypt the ciphertext emanating from the first program. The user can successfully run these two programs one after the other i.e"Ba= tch_Encryption_Program_Mark_0001" first and its co-program "General_Decrypt= ion_Program_Mark_0001" next as a pair. =20 Using this particular file and this particular KeyPad setting will verify t= he program authenticity by enabling the user to gauge the accurate reversib= ility of the previously scrambled ciphertext by decrypting it and then stu= dying the accuracy of the decrypted messagetext. The user might next try an alternative pair of parameters in the same plac= e in the same KeyPad block again to double-check the program i.e. this time= the pair (19, 4973) will be used, these parameters have also been verified= by me before the download took place but let the reader check this out for= themselves by keying them in and running the programs once more. Clearly,= the proof of success of the scrambling ploy is that the ciphertext created= in the first program, the encryption program, decrypts successfully in th= e second program while being totally and inextricably diffused to all adver= saries who might intercept it while it is in transit between the entities.= =20 Just one more trial parameter pair for good luck. The pair (72, 1312) has= also been verified by test running them in the same programs prior to down= loading but the user may want to check the computation of this pair again f= or one's own satisfaction. Note : There are at least 30000 other pairs of parameters (i.e. for this = particular plaintext file called "PlaintextFile_30000.dat") that should all= be in perfect order for using in this scrambling device but they should ea= ch be verified as a matter of good practice before use by readers. In general, the scope of the parameters selection domain is always a simple= function of the message-length. Having initially verified the "PlainTextFile_30000.dat" item the reader mi= ght next want to check out the other test files also in the same way i.e. f= iles containing 1 - 10000 characters in the same downloaded folder. Please note:- This is NOT free software by any definition of the word free,= it is instead copyright registered in my name.=20 Austin O'Byrne