From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.50.85.42 with SMTP id e10mr21973414igz.0.1409234950235; Thu, 28 Aug 2014 07:09:10 -0700 (PDT) X-Received: by 10.140.19.104 with SMTP id 95mr5884qgg.32.1409234950081; Thu, 28 Aug 2014 07:09:10 -0700 (PDT) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!news.eternal-september.org!feeder.eternal-september.org!news.glorb.com!uq10no6302411igb.0!news-out.google.com!q8ni2qal.1!nntp.google.com!m5no3860321qaj.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Thu, 28 Aug 2014 07:09:10 -0700 (PDT) Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=5.81.69.184; posting-account=j15vhwoAAABH_eywb4s2_dWxAM2kkx7W NNTP-Posting-Host: 5.81.69.184 User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <288ae016-9c9c-4537-b9f8-791d5b2c445b@googlegroups.com> Subject: Crypto App_1 Cipher_1 - Personalized Cryptography for Home Computers - handheld device driven - "Skew_Line_Encryptions" - Free Down load. From: austin.obyrne769@btinternet.com Injection-Date: Thu, 28 Aug 2014 14:09:10 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Xref: news.eternal-september.org comp.lang.ada:21950 Date: 2014-08-28T07:09:10-07:00 List-Id: Further to my earlier recent post "In the Pipe Line" announcement this ciph= er is now ready for downloading. http://www.adacryptpages.com=20 Please look for this title box - in the lower RH corner. "Crypto-App Cipher_1. - Skew Line Encryptions. Personalised Cryptography fo= r Tablets, Laptops, Desktop, Main Frame Computers Windows XP, Vista, 7, 8. = OS" The down load contains, 1) Program source code in Ada-95 2) Comprehensive User Guide 3) Ada gnat 311.p compiler for ready-to-use installing - user convenience. Note. - this cipher is downloadable by all and sundry with my best wishes. You may decide to use this cipher in many ways from just securing your info= rmation at home or in out-of-office situations.=20 However, For NETWORKING - i.e. setting up secure loops (channels) with other entitie= s. The copy you have down-loaded must be configured uniquely by you (in a few = easy steps as described here). You then record and keep this program (assoc= iated with some Bob say) and send an exact copy as a CD-ROM (or USB ??) to = your client 'Bob'(you being the sending entity 'Alice' - industry standard = pseudonyms).=20 Configuring Please locate this piece of the sourcecode below in each of these main prog= rams "BATCH_ENCRYPTION_PROGRAM_MARK_0" program and also in the "EMAIL_ENCRY= PTIONS_MARK_0" program.=20 FUNCTION Compose_CipherText_Items (NumIn: Integer) RETURN Integer IS NumOut: Integer; BEGIN --Compose_CipherText_Items; CASE NumIn IS =20 WHEN 1 =3D> NumOut:=3D Pn(1)+ Hash_2(Count); -- these WHEN 2 =3D> NumOut:=3D Pn(2)+ Hash_11(Count); WHEN 3 =3D> NumOut:=3D Pn(3)+ Hash_12(Count); WHEN OTHERS =3D> Ada.Text_IO. Put (Item =3D> "Forget it "); END CASE; RETURN NumOut; END Compose_CipherText_Items; *The focus is on the key information 'Hash_n' above. Note :- there are 12 distinct Hash programs available within the software p= rogram arrays and taken 3 at a time this enables 12!(factorial)/3!(factoria= l) different permutations of settings =3D> The Ada 'Case' Package may ther= efore have close on 80 million distinct Hash settings. - Choose one permuta= tion as above and insert this into the programs NAMED in capitals above- th= is configures your software uniquely. Also, in the third program called "GENERAL_DECRYPTIONS_PROGRAM_MARK_0" plea= se find these lines and make the exact same changes as you did in the other= programs. Pn(1):=3D W(1) - Hash_2(Count); -- change these also Pn(2):=3D W(2) - Hash_11(Count);=20 Pn(3):=3D W(3) - Hash_12(Count); When all of this is done the two configured softwares will be identical and= will comprise the "Mutual Databases" described in the User-Guide. =20 You can do this as often as you wish and create as many secure loops with o= ther people as you like (before I call time on the copyright (much later) -= maybe !.) *Important - You should immediately test your configuration changes by test= -running the prepared batch files of plaintext that are provided. =3D> Encr= ypt and immediately Decrypt at least some of the test files as well as also= simulating a trial 'Email' program. Note also, in addition to this (i.e. uniquely configuring mutual databases)= you can still configure the installed 'Key Pad' in the open source code Ad= a-95 program as often as you think fit in interim daily encryption work ses= sions . As long as the entities keep their mutual databases safe from common crimin= al theft (ordinary good housekeeping) you can enjoy perfect secrecy of comm= unications for evermore. The ciphertext string is a string of large (7 digits) integers and it trave= ls from Alice to Bob as a pasted attachment to an unsecured email. Periodi= c parameter changes in the 'Ked Pad' may go unsecured also (but you may pr= efer them encrypted - so be it also). Enjoy, I can be contacted on this URL :- austin.obyrne@hotmail.com adacrypt. ----------------------------------------------------------