From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.58.171.135 with SMTP id au7mr1060377vec.22.1386783457786; Wed, 11 Dec 2013 09:37:37 -0800 (PST) X-Received: by 10.182.53.193 with SMTP id d1mr33163obp.0.1386783457751; Wed, 11 Dec 2013 09:37:37 -0800 (PST) Path: border1.nntp.dca3.giganews.com!backlog3.nntp.dca3.giganews.com!border3.nntp.dca.giganews.com!border4.nntp.dca.giganews.com!border2.nntp.dca.giganews.com!nntp.giganews.com!ie8no8887145qab.0!news-out.google.com!9ni7231qaf.0!nntp.google.com!ie8no8887133qab.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Wed, 11 Dec 2013 09:37:37 -0800 (PST) In-Reply-To: <5b2ad24d-edf4-4621-a82d-6972e7d90f52@googlegroups.com> Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=86.140.183.44; posting-account=pmkN8QoAAAAtIhXRUfydb0SCISnwaeyg NNTP-Posting-Host: 86.140.183.44 References: <1d445f04-b670-444f-9858-55da271fe17a@googlegroups.com> <2b6dc37f-4aa6-4c18-be59-8c09f6f37f01@googlegroups.com> <52a87c86$0$6659$9b4e6d93@newsspool2.arcor-online.net> <6addc5a4-8cb4-48a7-abb0-b62105e7c13d@googlegroups.com> <5b2ad24d-edf4-4621-a82d-6972e7d90f52@googlegroups.com> User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <3d86f2fc-66d2-4b6d-b2ac-c6d6cfe1cd43@googlegroups.com> Subject: Re: Binary versus text and compiler versions, was: Re: Will Ada-95 Programs Written in MS Windows Run in MacOS and Linux Without Some Tweaking. From: Austin Obyrne Injection-Date: Wed, 11 Dec 2013 17:37:37 +0000 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-Original-Bytes: 5629 Xref: number.nntp.dca.giganews.com comp.lang.ada:184203 Date: 2013-12-11T09:37:37-08:00 List-Id: On Wednesday, December 11, 2013 4:26:35 PM UTC, Eryndlia Mavourneen wrote: > On Wednesday, December 11, 2013 10:07:28 AM UTC-6, Austin Obyrne wrote: >= On Wednesday, December 11, 2013 3:14:37 PM UTC, Eryndlia Mavourneen wrote:= > > > On Wednesday, December 11, 2013 8:53:58 AM UTC-6, G.B. wrote: > why = not > just require that encryption start at 7bit data units? > (This restri= ction helps keeping faulty produces in place, and it > allows continuing th= e ASCII caused destruction of well educated text > processing. ;-) I think = your are joking, since your post does not seem to indicate what you would d= o with the 8th bit of every byte, assuming your input is 8-bit bytes. Of co= urse, 7-bit ASCII would be unusable when dealing with videos, j-pegs, even = Word documents. What is the problem with simply reading binary disk blocks = as 8-bit text using Sequential_IO, since Austin wants to use the attributes= 'Pos and 'Val on the data stream? -- Eryndlia Mavourneen (KK1T) > > Like a= ll cryptography since the 1970's this crypto is is exclusively 'number-theo= retic'. > > Binary base is essential to the current block ciphers of NSA bu= t is a cul-de-sac for any further resaerach. > > Your admonition to increas= e the scope to cover all of Latin_1 has been implemented (C++ only uses ASC= II as far as I can tell but I am open to correction here). > > My stuff use= s the decimal base and the geometry of planes in three dimensions as the en= cryption environment. The scope is limiltless for the everyday applications= that all walks of life require. > > GET and PUT together with 'Pos and 'Va= l kick-start the computation of the ciphertext for each character read in w= hich is then completed in each single pass of the main loop i.e. read in, e= ncrypt, written out as ciphertext end-to-end in one throw straight. > > The= plaintext for encryption is read in character by character from text files= and is limited only by the computer capacity to store the growing array. T= his helps to make Ada a perfect language for cryptography. > > - There is n= o hard sell about this - just plain fact. > > adacrypt Agreed. The problem,= however, in using Text_IO is that terminators will be different on differe= nt systems and may even be handled differently on output by different compi= lers on the same system (if I recall correctly), and Text_IO attempts to in= terpret this data stream. You need to use an I/O method which ignores the m= eaning of these characters and really does just treat the data as numbers, = which is not what you are doing now with Text_IO. -- Eryndlia Mavourneen (K= K1T) That's useful to remember - may I counter this with the good news that what= ever marker the encryption program uses (peculiar to that system as you poi= nt out that could vary)the same marker will be amenable to the decryption p= rogram because fortunately they are exact copies that comprise what I am ca= lling the mutual databases. =20 They are both created by the sending entity and an exact copy is made that = is sent by a single secure delivery to the receiving entity in a one-off de= livery (this is safe for the life of the secure loop as long as the entitie= s keep their databases safe from ordinary criminal theft). In passing, this concept of muutual databases totally obviates the historic= al problem of embedded key transport that was extremely vulnerable and took= a lot of study time by researchers of the day. Does this concept stand up in your estimation i.e, the system-specific EoF = and EoM markers that you say can vary. Interesting point solved I hope - do you accept this? Austin