From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,FREEMAIL_FROM autolearn=unavailable autolearn_force=no version=3.4.4 X-Received: by 10.50.111.170 with SMTP id ij10mr8759306igb.1.1417892038787; Sat, 06 Dec 2014 10:53:58 -0800 (PST) X-Received: by 10.140.48.69 with SMTP id n63mr546qga.21.1417892038737; Sat, 06 Dec 2014 10:53:58 -0800 (PST) Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!mx02.eternal-september.org!feeder.eternal-september.org!news.glorb.com!h15no5299422igd.0!news-out.google.com!n9ni21qai.0!nntp.google.com!w8no5080125qac.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail Newsgroups: comp.lang.ada Date: Sat, 6 Dec 2014 10:53:57 -0800 (PST) In-Reply-To: Complaints-To: groups-abuse@google.com Injection-Info: glegroupsg2000goo.googlegroups.com; posting-host=2001:470:9174:1:ad81:2499:f4b6:5dcc; posting-account=r0RePAgAAABkc8iAou09Mtfbf-fnKQql NNTP-Posting-Host: 2001:470:9174:1:ad81:2499:f4b6:5dcc References: User-Agent: G2/1.0 MIME-Version: 1.0 Message-ID: <6d3d59b8-15a5-4938-8d9e-d75f7ab28ebd@googlegroups.com> Subject: Re: A Last Word on Ciphertext Expansion Ratio - Promise. From: mrvmurray@gmail.com Injection-Date: Sat, 06 Dec 2014 18:53:58 +0000 Content-Type: text/plain; charset=ISO-8859-1 Xref: news.eternal-september.org comp.lang.ada:23901 Date: 2014-12-06T10:53:57-08:00 List-Id: On Saturday, 6 December 2014 15:46:00 UTC, Austin Obyrne wrote: > I have never felt there was anything for me to defend really in such a large > ciphertext expansion given the relative cheapness of computer memory and > computer power today ... Whatever. If you won't listen, nobody will listen to you. A 10x increase in size is BAD. Folks get uppity over a 10% increase! > * At the time of designing my algorithm I envisaged two main attacks on > my cipher that I must counter i.e. ... No attacker is going to conveniently stick to the only attacks you have demonstrated you understand. They usually use the ones you demonstrate an inability to counter, and if you don't even understand the attack, the attacker has beaten you solidly. > The upshot of all of this is that there was some considerable 'overkill' in > the eventual ciphertext of my first cipher which I have now put right. Nope. The attack which you are ignoring still stands. Brute force. That fact that you don't understand how it could possibly work is my win. > A few more submarine cables and a few more communications satellites > would do the trick if the data transmission super highway ever gets too > crowded. Having worked on submarine cable repairs in the North Atlantic > for a few years I know the cost of implementing this claim and albeit > expensive to lay cables on the oceanbed 2 miles down it is not enough > to break the bank by any means I can assure you. Bullshit. Nobody is going to put in 10 undersea cables where one will do. They won't even put 2 if 1 will do. > Once again I thank the group for their all-round help in this matter. The help you continue to reject, you mean? Show your gratitude by taking the advice seriously, not dismissing it. M --