comp.lang.ada
 help / color / mirror / Atom feed
* Ada in Cryptography.
@ 2010-06-16  7:11 adacrypt
  0 siblings, 0 replies; 2+ messages in thread
From: adacrypt @ 2010-06-16  7:11 UTC (permalink / raw)


The portability of Ada by means of its packages is one of the great
advantages to be gained from using it as a language for encryption.
The concept of Mutual database Technology being promoted by me
completely obviates the key distribution problem that has soaked up so
much wasted effort by cryptographers in the past 40 years.  That
wasted effort evolved from the use of encapsulation cryptography that
required keys to be distributed between entities (Simon Singh “The
Code Book”).  It is made redundant now by a one-off secure delivery of
a database during the setting up of a secure crypto scheme that even
if it means using a trusted live courier to do this the expense is
justified by the fact of it being a once in a lifetime occurrence i.e.
once in the lifetime of the secure loop.

Although the problem of key distribution is overcome there is still a
need for global network construction that involves sending database
components like arrays of integers around the globe to set up
communications loops between entities.  The packages that comprise a
mutual database need to be customised and then sent to the entities of
new loops.

Using Ada packages greatly facilitates this by enabling non-specialist
operatives to prepare them off-line, create libraries, sent packages
by unsecured email keep management records etc.

The equivalent containers of other languages are not nearly as
accommodating in that respect - adacrypt






^ permalink raw reply	[flat|nested] 2+ messages in thread

* Ada in Cryptography.
@ 2010-06-17  6:58 adacrypt
  0 siblings, 0 replies; 2+ messages in thread
From: adacrypt @ 2010-06-17  6:58 UTC (permalink / raw)


For whatever it may be worth to any reader – in security of
information an out-of-office user may be a business person, a
diplomat, military person or whatever but the need in every case is
the same and is twofold i.e. they need a secure communications
facility to email home sensitive information accumulated during a trip
or the secure storage of sensitive data within the computer, that can
only be provided by encryption of the data that they accumulate during
a trip. They may wish to secure this information should their laptop
computer or whatever be stolen, the loss of the computer is the least
of their worries in that event usually.

The ciphers to hand are written in Ada-95 and operate from a stick of
removable memory in a USB port.  The compiler is installed within the
computer but the cipher remains on board the pen drive in the USB
port.

An advantage of using a pen drive like this is that because it alone
contains the cipher then the compiler reads and writes to the pen
drive only and thus bye-passes the computer hard-drive proper.  A
benefit of this mode of operation is that the plaintext for encryption
does not get into the hard drive and the danger of leaving residual
impressions on the hard drive that may be recovered as information by
cryptanalysts using forensic means is obviated. (I would welcome any
advanced information from more expert readers on this point)

The characters for encryption are encrypted one at a time so that each
character over-writes the previous one in RAM and in the computer CPU
and again no impressions are left inside the computer that an
adversary who steals the person’s laptop may use to get the sensitive
information being protected.

This customised crypto scheme is not peculiar to Ada-95 alone but the
only ciphers to hand at present that do this are written in Ada-95 -
it is the method that is under focus here  - adacrypt



^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2010-06-17  6:58 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2010-06-17  6:58 Ada in Cryptography adacrypt
  -- strict thread matches above, loose matches on Subject: below --
2010-06-16  7:11 adacrypt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox