From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,8701dd61403f6aa6 X-Google-NewGroupId: yes X-Google-Attributes: gida07f3367d7,domainid0,public,usenet X-Google-Language: ENGLISH,CP1252 Path: g2news1.google.com!postnews.google.com!q12g2000yqj.googlegroups.com!not-for-mail From: adacrypt Newsgroups: comp.lang.ada Subject: Re: A Newbie to the group. Date: Tue, 15 Jun 2010 08:43:49 -0700 (PDT) Organization: http://groups.google.com Message-ID: <26d9422f-e704-458b-a6eb-c7ec70a28ba7@q12g2000yqj.googlegroups.com> References: NNTP-Posting-Host: 81.151.237.229 Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable X-Trace: posting.google.com 1276616630 6052 127.0.0.1 (15 Jun 2010 15:43:50 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Tue, 15 Jun 2010 15:43:50 +0000 (UTC) Complaints-To: groups-abuse@google.com Injection-Info: q12g2000yqj.googlegroups.com; posting-host=81.151.237.229; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; GTB6.5; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729),gzip(gfe) Xref: g2news1.google.com comp.lang.ada:11761 Date: 2010-06-15T08:43:49-07:00 List-Id: On Jun 15, 4:02=A0pm, Adam Beneschan wrote: > On Jun 15, 7:51=A0am, adacrypt wrote: > > > > > > > I have only just discovered your group and I must say this is a great > > discovery to me =96 =A0Where have I been you might ask? =96 now that I= =92m > > here I look forward to coming again often. > > > My interest has been in the application of Ada-95 to cryptography for > > over 10 years and I can demonstrate some very powerful ciphers as the > > result. =A0These are world firsts in being theoretically unbreakable in > > class. > > > I have been subscribing to sci crypt news group exclusively up until > > today and I have been using the pseudonym =91adacrypt=92. > > > I have been banging the drum so loudly for Ada-95 over there and > > rattling the bars of their cages that I think I am high on some > > people=92s assassination list. > > > The good news is that there is demonstrably unbreakable cryptography > > on the table that owes a lot to Ada-95. > > Interesting. =A0I always thought that unbreakable cryptography was > related more to C to Ada. =A0I mean, there's a *lot* of C programs out > there that no mortal human can decode.... :) :) :) :) :) > > =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0-- Adam- Hide quot= ed text - > > - Show quoted text - Hi adam, There's a lot to be talked about here - may I explain my earlier remark that this cryptography owes a lot to Ada-95 - more correctly it owes alot to Professsor Feldman and the help he gave me at the outset some 8 years when I choose to learn Ada-95 in order to implement my brainwave of factoring three-dimensional vectors and using three- dimensional space as the encryption environment in cryptography - that had been suggested to me by an Iraqi mathematician who had read my work in factoring vectors and I was convinced that Ada-95 was the only language for this - I had studied Ada-83 at the University of Liverpool but it was on a mainframe computer (student's piece of directory) some 10 years earlier - I could handle the task of getting started again on a PC and it was a Godsend that Professor Feldman gave me a lot of help - I couldnt even install the compiler I was so green with PC's - he has probaly forgotten this by now but I haven't. Could I ask you to vist my website http://www.adacrypt.com abd have a look at " A New Approach to Cryptography" - this is attracting alot of interest by academic visitors. Could you please have a look at "File Handling in Ada-95 - A Demonstration" in today's post. Also could I ask you to have a look at my posting in sci crypt a few days ago called "The Winds of Change - The Three Faces of Cryptography". Crypto strength is not peculiar to any programming language on its own - reference your remark about 'C' programming language(in my view) but Ada lends itself admirably to cipher design. - adcrypt