From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,f2b353a56cdecaaa X-Google-NewGroupId: yes X-Google-Attributes: gida07f3367d7,domainid0,public,usenet X-Google-Language: ENGLISH,CP1252 Path: g2news1.google.com!postnews.google.com!r27g2000yqb.googlegroups.com!not-for-mail From: adacrypt Newsgroups: comp.lang.ada Subject: Ada in Cryptography. Date: Wed, 16 Jun 2010 23:58:38 -0700 (PDT) Organization: http://groups.google.com Message-ID: <119c477b-9093-460a-a883-0e61f6a23f61@r27g2000yqb.googlegroups.com> NNTP-Posting-Host: 86.135.205.234 Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable X-Trace: posting.google.com 1276757919 20212 127.0.0.1 (17 Jun 2010 06:58:39 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Thu, 17 Jun 2010 06:58:39 +0000 (UTC) Complaints-To: groups-abuse@google.com Injection-Info: r27g2000yqb.googlegroups.com; posting-host=86.135.205.234; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; GTB6.5; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729),gzip(gfe) Xref: g2news1.google.com comp.lang.ada:11795 Date: 2010-06-16T23:58:38-07:00 List-Id: For whatever it may be worth to any reader =96 in security of information an out-of-office user may be a business person, a diplomat, military person or whatever but the need in every case is the same and is twofold i.e. they need a secure communications facility to email home sensitive information accumulated during a trip or the secure storage of sensitive data within the computer, that can only be provided by encryption of the data that they accumulate during a trip. They may wish to secure this information should their laptop computer or whatever be stolen, the loss of the computer is the least of their worries in that event usually. The ciphers to hand are written in Ada-95 and operate from a stick of removable memory in a USB port. The compiler is installed within the computer but the cipher remains on board the pen drive in the USB port. An advantage of using a pen drive like this is that because it alone contains the cipher then the compiler reads and writes to the pen drive only and thus bye-passes the computer hard-drive proper. A benefit of this mode of operation is that the plaintext for encryption does not get into the hard drive and the danger of leaving residual impressions on the hard drive that may be recovered as information by cryptanalysts using forensic means is obviated. (I would welcome any advanced information from more expert readers on this point) The characters for encryption are encrypted one at a time so that each character over-writes the previous one in RAM and in the computer CPU and again no impressions are left inside the computer that an adversary who steals the person=92s laptop may use to get the sensitive information being protected. This customised crypto scheme is not peculiar to Ada-95 alone but the only ciphers to hand at present that do this are written in Ada-95 - it is the method that is under focus here - adacrypt