comp.lang.ada
 help / color / mirror / Atom feed
From: austin.obyrne769@btinternet.com
Subject: Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" -  Free Down load.
Date: Thu, 28 Aug 2014 07:09:10 -0700 (PDT)
Date: 2014-08-28T07:09:10-07:00	[thread overview]
Message-ID: <288ae016-9c9c-4537-b9f8-791d5b2c445b@googlegroups.com> (raw)


Further to my earlier recent post "In the Pipe Line" announcement this cipher is now ready for downloading.

http://www.adacryptpages.com 

Please look for this title box - in the lower RH corner.

"Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography for Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8. OS"

The down load contains,

1) Program source code in Ada-95
2) Comprehensive User Guide
3) Ada gnat 311.p compiler for ready-to-use installing - user  convenience.

Note. - this cipher is downloadable by all and sundry with my best wishes.

You may decide to use this cipher in many ways from just securing your information at home or in out-of-office situations. 

However,

For NETWORKING - i.e. setting up secure loops (channels) with other entities.

The copy you have down-loaded must be configured uniquely by you (in a few easy steps as described here). You then record and keep this program (associated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) to your client 'Bob'(you being the sending entity 'Alice' - industry standard pseudonyms). 

Configuring
Please locate this piece of the sourcecode below in each of these main programs "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENCRYPTIONS_MARK_0" program. 

FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS
    NumOut: Integer;

BEGIN --Compose_CipherText_Items;

CASE NumIn IS
   
   WHEN 1 => NumOut:= Pn(1)+ Hash_2(Count); -- these
   WHEN 2 => NumOut:= Pn(2)+ Hash_11(Count);
   WHEN 3 => NumOut:= Pn(3)+ Hash_12(Count);
          WHEN OTHERS =>
    Ada.Text_IO. Put (Item => "Forget it ");
  END CASE;
  RETURN NumOut;

END Compose_CipherText_Items;

*The focus is on the key information 'Hash_n' above.

Note :- there are 12 distinct Hash programs available within the software program arrays and taken 3 at a time this enables 12!(factorial)/3!(factorial) different permutations of settings => The Ada 'Case' Package  may therefore have close on 80 million distinct Hash settings. - Choose one permutation as above and insert this into the programs NAMED in capitals above- this configures your software uniquely.

Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" please find these lines and make the exact same changes as you did in the other programs.

  Pn(1):= W(1) - Hash_2(Count);  -- change these also
  Pn(2):= W(2) - Hash_11(Count); 
  Pn(3):= W(3) - Hash_12(Count);

When all of this is done the two configured softwares will be identical and will comprise the "Mutual Databases" described in the User-Guide.
 
You can do this as often as you wish and create as many secure loops with other people as you like (before I call time on the copyright (much later) - maybe !.)

*Important - You should immediately test your configuration changes by test-running the prepared batch files of plaintext that are provided. => Encrypt and immediately Decrypt at least some of the test files as well as also simulating a trial 'Email' program.

Note also, in addition to this (i.e. uniquely configuring mutual databases) you can still configure the installed 'Key Pad' in the open source code Ada-95 program as often as you think fit in interim daily encryption work sessions .

As long as the entities keep their mutual databases safe from common criminal theft (ordinary good housekeeping) you can enjoy perfect secrecy of communications for evermore.

The ciphertext string is a string of large (7 digits) integers and it travels from Alice to Bob as a pasted attachment to an unsecured email.  Periodic parameter changes  in the 'Ked Pad' may go unsecured also (but you may prefer them encrypted - so be it also).

Enjoy,

I can be contacted on this URL :- austin.obyrne@hotmail.com

adacrypt.

          ----------------------------------------------------------




             reply	other threads:[~2014-08-28 14:09 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-08-28 14:09 austin.obyrne769 [this message]
2014-08-28 16:00 ` Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" - Free Down load Austin Obyrne
2014-08-28 16:31 ` Austin Obyrne
2014-08-28 16:46 ` Denis McMahon
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox