comp.lang.ada
 help / color / mirror / Atom feed
* Vector Cryptography - The User, the  Interface, and Ada-95.
@ 2014-02-19 14:09 Austin Obyrne
  2014-02-19 16:58 ` darkestkhan
  2014-02-24  9:35 ` ake.ragnar.dahlgren
  0 siblings, 2 replies; 4+ messages in thread
From: Austin Obyrne @ 2014-02-19 14:09 UTC (permalink / raw)


The user of this cryptography can be introduced to it in a few minutes and does not need to know anything about cryptography or vector mathematics and only enough keyboard skills to be able to make very minor changes to some well-highlighted parameters in the declarations box of the cipher program. 

The cipher program is written in the Ada-95 programming language.

Encryption is done either on batch files (i.e. files created at another time and possibly place) or interactively in real time as say in email mode.

The only requirement is that batch files must have a .txt file extension (dot txt).

A user may be any person who is doing an activity that might be ordinary word processing, website programming, computer language programming.

Any of these activities may be summarily truncated ad hoc by the user in the middle of a work session.  It is then copy 'n pasted into a general text editor, saved as a file for encryption, encrypted and saved as a file of ciphertext - all of this takes just seconds in most cases. 

The same file is retrieved by symmetrically inverting the foregoing procedure and continuing the object work where the user left off.

* There is no need for handpicked graduates to perform essential platform work before the encryption proper begins as in some other ciphers.

The Ada language is consider ideal for this cryptography because of the very large arrays that must be made available for calling ad hoc (in the wings) and for loading (and simultaneously scrambling) into the ready-to-use program source code arrays just before run time when the computer 'boots up'.

All other languages have large containers that can also do this but at a price.  The Ada packages are ideal in my view for coping with this common problem.

Fee paying students from overseas should expect to spend at least one year learning the vector mathematics of the cryptography as well as learning the Ada programming of the ciphers at the same time.

There is a year's hard work in it for anybody.

Good luck all.

adacrypt

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2014-02-25 13:30 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-02-19 14:09 Vector Cryptography - The User, the Interface, and Ada-95 Austin Obyrne
2014-02-19 16:58 ` darkestkhan
2014-02-24  9:35 ` ake.ragnar.dahlgren
2014-02-25 13:30   ` darkestkhan

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox